Re: [PATCH 2/2] Doc:crypto: Fix typo in crypto-API.xml

2015-06-03 Thread Stephan Mueller
Am Donnerstag, 4. Juni 2015, 00:01:21 schrieb Masanari Iida: Hi Masanari, This patch fix some typos found in crypto-API.xml. It is because the file is generated from comments in sources, so I had to fix typo in sources. Signed-off-by: Masanari Iida standby2...@gmail.com Acked-by: Stephan

Re: [PATCH v9 4/4] crypto: Add Allwinner Security System crypto accelerator

2015-06-03 Thread Corentin LABBE
Le 23/05/2015 16:35, Boris Brezillon a écrit : Hi Corentin, On Sat, 23 May 2015 15:12:23 +0200 Corentin LABBE clabbe.montj...@gmail.com wrote: Le 17/05/2015 10:45, Boris Brezillon a écrit : Hi Corentin, I started to review this new version, and I still think there's something wrong

[PATCH RFC v3 2/3] crypto: RSA: KEYS: convert rsa and public key to new PKE API

2015-06-03 Thread Tadeusz Struk
Change the existing rsa and public key code to integrate it with the new Public Key Encryption API. Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com --- crypto/asymmetric_keys/Kconfig|1 crypto/asymmetric_keys/Makefile |1 crypto/asymmetric_keys/pkcs7_parser.c

[PATCH RFC v3 0/3] crypto: Introduce Public Key Encryption API

2015-06-03 Thread Tadeusz Struk
This patch set introduces a Public Key Encryption API. What is proposed is a new crypto type called crypto_pkey_type plus new struct pkey_alg and struct pkey_tfm together with number of helper functions to register pkey type algorithms and allocate tfm instances. This is to make it similar to how

[PATCH RFC v3 1/3] crypto: add PKE API

2015-06-03 Thread Tadeusz Struk
Add Public Key Encryption API. Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com --- crypto/Kconfig |6 + crypto/Makefile|1 crypto/akcipher.c | 100 +++ crypto/crypto_user.c | 23 +++ include/crypto/akcipher.h | 385

[PATCH RFC v3 3/3] crypto: add tests vectors for RSA

2015-06-03 Thread Tadeusz Struk
New test vectors for RSA algorithm. Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com --- crypto/testmgr.c | 151 ++ crypto/testmgr.h | 86 +++ 2 files changed, 237 insertions(+) diff --git a/crypto/testmgr.c

Re: [PATCH RFC v3 3/3] crypto: add tests vectors for RSA

2015-06-03 Thread Stephan Mueller
Am Mittwoch, 3. Juni 2015, 15:44:24 schrieb Tadeusz Struk: Hi Tadeusz, New test vectors for RSA algorithm. Signed-off-by: Tadeusz Struk tadeusz.st...@intel.com --- crypto/testmgr.c | 151 ++ crypto/testmgr.h | 86

[PATCH 0/8] crypto: Avoid using RNG in interrupt context

2015-06-03 Thread Herbert Xu
Hi: Currently we always use stdrng in interrupt context, which doesn't work very well with DRBG which cannot be called there. We could change DRBG but it really does a lot of work (e.g., a reseed) in its generation function and doing it in interrupt context would be bad. In fact, the only

[CFP] Reminder: Linux Security Summit 2015 CFP closes this Friday 5th June

2015-06-03 Thread James Morris
Just a reminder to folk who've done interesting things in Linux security this year, the CFP for LSS 2015 is open until this Friday, 5th June. See the following link for details: http://kernsec.org/wiki/index.php/Linux_Security_Summit_2015 This is not just for kernel developers, or even

[PATCH 4/8] crypto: seqiv - Move IV seeding into init function

2015-06-03 Thread Herbert Xu
We currently do the IV seeding on the first givencrypt call in order to conserve entropy. However, this does not work with DRBG which cannot be called from interrupt context. In fact, with DRBG we don't need to conserve entropy anyway. So this patch moves the seeding into the init function.

[PATCH 6/8] crypto: echainiv - Set Kconfig default to m

2015-06-03 Thread Herbert Xu
As this is required by many IPsec algorithms, let's set the default to m. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/Kconfig |1 + 1 file changed, 1 insertion(+) diff --git a/crypto/Kconfig b/crypto/Kconfig index af011a9..c3b6a5b 100644 --- a/crypto/Kconfig +++

[PATCH 5/8] crypto: drbg - Add stdrng alias and increase priority

2015-06-03 Thread Herbert Xu
This patch adds the stdrng module alias and increases the priority to ensure that it is loaded in preference to other RNGs. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/drbg.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/crypto/drbg.c

[PATCH 3/8] crypto: eseqiv - Move IV seeding into init function

2015-06-03 Thread Herbert Xu
We currently do the IV seeding on the first givencrypt call in order to conserve entropy. However, this does not work with DRBG which cannot be called from interrupt context. In fact, with DRBG we don't need to conserve entropy anyway. So this patch moves the seeding into the init function.

[PATCH 1/8] crypto: chainiv - Move IV seeding into init function

2015-06-03 Thread Herbert Xu
We currently do the IV seeding on the first givencrypt call in order to conserve entropy. However, this does not work with DRBG which cannot be called from interrupt context. In fact, with DRBG we don't need to conserve entropy anyway. So this patch moves the seeding into the init function.

[PATCH 2/8] crypto: echainiv - Move IV seeding into init function

2015-06-03 Thread Herbert Xu
We currently do the IV seeding on the first givencrypt call in order to conserve entropy. However, this does not work with DRBG which cannot be called from interrupt context. In fact, with DRBG we don't need to conserve entropy anyway. So this patch moves the seeding into the init function.

[PATCH 7/8] crypto: rng - Make DRBG the default RNG

2015-06-03 Thread Herbert Xu
This patch creates a new invisible Kconfig option CRYPTO_RNG_DEFAULT that simply selects the DRBG. This new option is then selected by the IV generators. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/Kconfig | 15 --- 1 file changed, 8 insertions(+), 7

Re: [PATCH 5/8] crypto: drbg - Add stdrng alias and increase priority

2015-06-03 Thread Herbert Xu
On Wed, Jun 03, 2015 at 08:59:13AM +0200, Stephan Mueller wrote: Considering the patch 8/8 which removes krng, wouldn't it make sense to remove the following code from the DRBG: /* * If FIPS mode enabled, the selected DRBG shall have the * highest cra_priority

Re: [PATCH 5/8] crypto: drbg - Add stdrng alias and increase priority

2015-06-03 Thread Stephan Mueller
Am Mittwoch, 3. Juni 2015, 14:49:28 schrieb Herbert Xu: Hi Herbert, This patch adds the stdrng module alias and increases the priority to ensure that it is loaded in preference to other RNGs. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/drbg.c |3 ++- 1 file changed, 2

Re: [PATCH 5/8] crypto: drbg - Add stdrng alias and increase priority

2015-06-03 Thread Stephan Mueller
Am Mittwoch, 3. Juni 2015, 15:01:39 schrieb Herbert Xu: Hi Herbert, You'd have to remove it from ansi_cprng first. Feel free to send patches to do that. Absolutely, my bad. -- Ciao Stephan -- To unsubscribe from this list: send the line unsubscribe linux-crypto in the body of a message to

Re: [PATCH 0/9] crypto: Add ChaCha20-Poly1305 AEAD support for IPsec

2015-06-03 Thread Steffen Klassert
On Wed, Jun 03, 2015 at 10:44:25AM +0800, Herbert Xu wrote: On Mon, Jun 01, 2015 at 01:43:55PM +0200, Martin Willi wrote: This is a first version of a patch series implementing the ChaCha20-Poly1305 AEAD construction defined in RFC7539. It is based on the current cryptodev tree. The

Re: [PATCH] crypto: prevent nx 842 load if no hw driver

2015-06-03 Thread Dan Streetman
On Wed, Jun 3, 2015 at 1:08 AM, Herbert Xu herb...@gondor.apana.org.au wrote: On Thu, May 28, 2015 at 04:21:31PM -0400, Dan Streetman wrote: Change the nx-842 common driver to wait for loading of both platform drivers, and fail loading if the platform driver pointer is not set. Add an

[PATCH 1/2] Doc:crypto: Fix typo in crypto-API.tmpl

2015-06-03 Thread Masanari Iida
This patch fix some spelling typo found in crypto-API.tmpl Signed-off-by: Masanari Iida standby2...@gmail.com --- Documentation/DocBook/crypto-API.tmpl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Documentation/DocBook/crypto-API.tmpl

Re: [V5 PATCH 2/5] arm64 : Introduce support for ACPI _CCA object

2015-06-03 Thread Mark Salter
On Wed, 2015-06-03 at 09:37 -0500, Suravee Suthikulanit wrote: On 5/28/2015 9:38 PM, Mark Salter wrote: On Wed, 2015-05-20 at 17:09 -0500, Suravee Suthikulpanit wrote: Fromhttp://www.uefi.org/sites/default/files/resources/ACPI_6.0.pdf, section 6.2.17 _CCA states that ARM platforms require

Re: Crypto driver -DCP

2015-06-03 Thread Herbert Xu
On Wed, Jun 03, 2015 at 03:02:13PM -0500, Jay Monkman wrote: That would be one use, but a more likely use would be to prevent access to the keys. A system could write keys to the key slots in the bootloader or in a TrustZone secure world. Then those keys could be used for crypto operations in