13 Aug, 2009

3 commits


10 Aug, 2009

1 commit


16 Jul, 2009

1 commit


15 Jul, 2009

2 commits

  • The previous change to allow hashing from states other than the
    initial broke compilation on i386 because the inline assembly
    tried to squeeze a u64 into a 32-bit register. As we've already
    checked for 32-bit overflows we can simply truncate it to u32,
    or unsigned long so that we don't truncate at all on x86-64.

    Signed-off-by: Herbert Xu

    Herbert Xu
     
  • The crypto4xx SHA implementation keeps the hash state in the tfm
    data structure. This breaks a fundamental requirement of ahash
    implementations that they must be reentrant.

    This patch disables the broken implementation.

    Signed-off-by: Herbert Xu

    Herbert Xu
     

14 Jul, 2009

3 commits

  • This patch changes crypto4xx to use the new style ahash type.
    In particular, we now use ahash_alg to define ahash algorithms
    instead of crypto_alg.

    This is achieved by introducing a union that encapsulates the
    new type and the existing crypto_alg structure. They're told
    apart through a u32 field containing the type value.

    Signed-off-by: Herbert Xu

    Herbert Xu
     
  • This patch makes crypto4xx use crypto_ahash_set_reqsize to avoid
    accessing crypto_ahash directly.

    Signed-off-by: Herbert Xu

    Herbert Xu
     
  • This patch converts the padlock-sha implementation to shash.
    In doing so the existing mechanism of storing the data until
    final is no longer viable as we do not have a way of allocating
    data in crypto_shash_init and then reliably freeing it.

    This is just as well because a better way of handling the problem
    is to hash everything but the last chunk using normal sha code
    and then provide the intermediate result to the padlock device.

    This is good enough because the primary application of padlock-sha
    is IPsec and there the data is laid out in the form of an hmac
    header followed by the rest of the packet. In essence we can
    provide all the data to the padlock as the hmac header only needs
    to be hashed once.

    Signed-off-by: Herbert Xu

    Herbert Xu
     

11 Jul, 2009

1 commit


18 Jun, 2009

2 commits


15 Jun, 2009

1 commit

  • * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/trivial: (31 commits)
    trivial: remove the trivial patch monkey's name from SubmittingPatches
    trivial: Fix a typo in comment of addrconf_dad_start()
    trivial: usb: fix missing space typo in doc
    trivial: pci hotplug: adding __init/__exit macros to sgi_hotplug
    trivial: Remove the hyphen from git commands
    trivial: fix ETIMEOUT -> ETIMEDOUT typos
    trivial: Kconfig: .ko is normally not included in module names
    trivial: SubmittingPatches: fix typo
    trivial: Documentation/dell_rbu.txt: fix typos
    trivial: Fix Pavel's address in MAINTAINERS
    trivial: ftrace:fix description of trace directory
    trivial: unnecessary (void*) cast removal in sound/oss/msnd.c
    trivial: input/misc: Fix typo in Kconfig
    trivial: fix grammo in bus_for_each_dev() kerneldoc
    trivial: rbtree.txt: fix rb_entry() parameters in sample code
    trivial: spelling fix in ppc code comments
    trivial: fix typo in bio_alloc kernel doc
    trivial: Documentation/rbtree.txt: cleanup kerneldoc of rbtree.txt
    trivial: Miscellaneous documentation typo fixes
    trivial: fix typo milisecond/millisecond for documentation and source comments.
    ...

    Linus Torvalds
     

13 Jun, 2009

1 commit


02 Jun, 2009

8 commits


18 May, 2009

1 commit


21 Apr, 2009

1 commit


12 Apr, 2009

1 commit

  • - the loaded firmware may not support crypto at all or
    only support DES and 3DES but not AES or
    support DES, 3DES and AES.

    - in case of no crypto support of the firmware, the module load will fail.
    - in case of missing AES support, the AES algorithms are not registered
    and a warning is printed during module load.

    Signed-off-by: Christian Hohnstaedt
    Signed-off-by: Herbert Xu

    Christian Hohnstaedt
     

07 Apr, 2009

1 commit


04 Apr, 2009

1 commit


03 Apr, 2009

1 commit

  • It is a fairly common operation to have a pointer to a work and to need a
    pointer to the delayed work it is contained in. In particular, all
    delayed works which want to rearm themselves will have to do that. So it
    would seem fair to offer a helper function for this operation.

    [akpm@linux-foundation.org: coding-style fixes]
    Signed-off-by: Jean Delvare
    Acked-by: Ingo Molnar
    Cc: "David S. Miller"
    Cc: Herbert Xu
    Cc: Benjamin Herrenschmidt
    Cc: Martin Schwidefsky
    Cc: Greg KH
    Cc: Pekka Enberg
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Jean Delvare
     

27 Mar, 2009

2 commits

  • - keep dma functions away from chained scatterlists.
    Use the existing scatterlist iteration inside the driver
    to call dma_map_single() for each chunk and avoid dma_map_sg().

    Signed-off-by: Christian Hohnstaedt
    Tested-By: Karl Hiramoto
    Signed-off-by: Herbert Xu

    Christian Hohnstaedt
     
  • * git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (29 commits)
    crypto: sha512-s390 - Add missing block size
    hwrng: timeriomem - Breaks an allyesconfig build on s390:
    nlattr: Fix build error with NET off
    crypto: testmgr - add zlib test
    crypto: zlib - New zlib crypto module, using pcomp
    crypto: testmgr - Add support for the pcomp interface
    crypto: compress - Add pcomp interface
    netlink: Move netlink attribute parsing support to lib
    crypto: Fix dead links
    hwrng: timeriomem - New driver
    crypto: chainiv - Use kcrypto_wq instead of keventd_wq
    crypto: cryptd - Per-CPU thread implementation based on kcrypto_wq
    crypto: api - Use dedicated workqueue for crypto subsystem
    crypto: testmgr - Test skciphers with no IVs
    crypto: aead - Avoid infinite loop when nivaead fails selftest
    crypto: skcipher - Avoid infinite loop when cipher fails selftest
    crypto: api - Fix crypto_alloc_tfm/create_create_tfm return convention
    crypto: api - crypto_alg_mod_lookup either tested or untested
    crypto: amcc - Add crypt4xx driver
    crypto: ansi_cprng - Add maintainer
    ...

    Linus Torvalds
     

04 Mar, 2009

1 commit


26 Feb, 2009

1 commit

  • With the mandatory algorithm testing at registration, we have
    now created a deadlock with algorithms requiring fallbacks.
    This can happen if the module containing the algorithm requiring
    fallback is loaded first, without the fallback module being loaded
    first. The system will then try to test the new algorithm, find
    that it needs to load a fallback, and then try to load that.

    As both algorithms share the same module alias, it can attempt
    to load the original algorithm again and block indefinitely.

    As algorithms requiring fallbacks are a special case, we can fix
    this by giving them a different module alias than the rest. Then
    it's just a matter of using the right aliases according to what
    algorithms we're trying to find.

    Signed-off-by: Herbert Xu

    Herbert Xu
     

18 Feb, 2009

2 commits


25 Dec, 2008

5 commits