From: Zeng Xin
The VF bundle interrupt is not triggered any more in
the case when guest is shut down with sample app running.
Need to clear the flag interrupt bit when restarting to fix
this irrecoverable state.
Signed-off-by: Zeng Xin
Signed-off-by: Tadeusz Struk
---
drivers/crypto/qat/qat_c
Hi Herbert,
On 12/09/2015 11:59 AM, Tadeusz Struk wrote:
> From: Signed-off-by: Zeng Xin
>
> The VF bundle interrupt is not triggered any more in
> the case when guest is shut down with sample app running.
> Need to clear the flag interrupt bit when restarting to fix
> this irrecoverable state.
>
On Thu, Dec 10, 2015 at 02:49:27AM +0800, kbuild test robot wrote:
> tree:
> https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
> master
> head: 161151d79ff4f7ed35d4ebb0eb7727a517c34ef2
> commit: 3d5b1ecdea6fb94f8c61554fcb2ba776a2d3d0e6 [53/54] crypto: rsa - RSA
> padd
On Wed, Dec 09, 2015 at 09:23:14AM -0800, Tim Chen wrote:
>
> This is an internal algorithm. We are indeed casting the request
> to the outer ablkcipher request when we do the async cipher walk.
The question remain: why does it have to be a blkcipher rather
than an ablkcipher?
Cheers,
--
Email
Hi,
在 2015年12月09日 18:55, LABBE Corentin 写道:
> Hello
>
> I have some comments below.
Thanks for your comments.:-)
>
> On Wed, Dec 09, 2015 at 06:16:42PM +0800, Zain Wang wrote:
>> Add md5 sha1 sha256 support for crypto engine in rk3288.
>> This patch can't support multiple updatings because of limi
This patch converts the module verification code to the new akcipher API.
Signed-off-by: Tadeusz Struk
---
crypto/asymmetric_keys/Kconfig|2
crypto/asymmetric_keys/Makefile |7 -
crypto/asymmetric_keys/pkcs7_parser.c | 12 +-
crypto/asymmetric_keys/pkcs7_trus
Convert asymmetric_verify to akcipher api.
Signed-off-by: Tadeusz Struk
---
security/integrity/digsig_asymmetric.c | 10 +++---
1 file changed, 3 insertions(+), 7 deletions(-)
diff --git a/security/integrity/digsig_asymmetric.c
b/security/integrity/digsig_asymmetric.c
index 4fec181..55f4
This patch set converts the module verification and digital signature
code to the new akcipher API.
RSA implementation has been removed from crypto/asymmetric_keys and the
new API is used for cryptographic primitives.
There is no need for MPI above the akcipher API anymore.
Modules can be verified
tree:
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master
head: 161151d79ff4f7ed35d4ebb0eb7727a517c34ef2
commit: 8b206f2d666f41f0aa83dec83504801ee945d3dc [50/54] crypto: qat - add
support for c3xxxvf accel type
config: x86_64-randconfig-x009-12092253 (attached as
Fix i386-randconfig-x004-12092241.
PCI_IOV needs to be selected when VFs are enabled
Reported-by:
Signed-off-by: Tadeusz Struk
---
drivers/crypto/qat/Kconfig |2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/crypto/qat/Kconfig b/drivers/crypto/qat/Kconfig
index d275d48..85b44e5 1
From: Signed-off-by: Zeng Xin
The VF bundle interrupt is not triggered any more in
the case when guest is shut down with sample app running.
Need to clear the flag interrupt bit when restarting to fix
this irrecoverable state.
Signed-off-by: Zeng Xin
Signed-off-by: Tadeusz Struk
---
drivers/c
This file does not contain any modular related function calls. So get
rid of module.h since it drags in a lot of other headers and adds to
the preprocessing load. It does export some symbols though, so we'll
need to ensure it has export.h present instead.
Cc: Herbert Xu
Cc: "David S. Miller"
C
From: Harvijay Saini
When many threads submit multiple requests they get blocked until all
responses are processed, which prevents them from submitting more requests
even though there is space on the rings.
To fix this we need to decrement the inflight counter early to in the callback.
Signed-of
tree:
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master
head: 161151d79ff4f7ed35d4ebb0eb7727a517c34ef2
commit: 3d5b1ecdea6fb94f8c61554fcb2ba776a2d3d0e6 [53/54] crypto: rsa - RSA
padding algorithm
config: s390-allmodconfig (attached as .config)
reproduce:
On Wed, Dec 09, 2015 at 05:20:45PM +0200, Horia Geantă wrote:
> On 12/7/2015 9:12 PM, Russell King wrote:
> > Strictly, dma_map_sg() may coalesce SG entries, but in practise on iMX
> > hardware, this will never happen. However, dma_map_sg() can fail, and
> > we completely fail to check its return
On Wed, Dec 09, 2015 at 05:08:41PM +0200, Horia Geantă wrote:
> On 12/7/2015 9:12 PM, Russell King wrote:
> > Ensure that we clean up allocations and DMA mappings after encountering
> > an error rather than just giving up and leaking memory and resources.
> >
> > Signed-off-by: Russell King
>
>
tree:
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master
head: 161151d79ff4f7ed35d4ebb0eb7727a517c34ef2
commit: 3771df3cff7536da19cba2b4755ad628dc4bf371 [51/54] crypto: qat - add
support for c62xvf accel type
config: i386-randconfig-x004-12092241 (attached as .co
On Wed, Dec 09, 2015 at 05:06:03PM +0200, Horia Geantă wrote:
> On 12/7/2015 9:11 PM, Russell King - ARM Linux wrote:
> > Here are further imx-caam updates that I've had since before the
> > previous merge window. Please review and (I guess) if Freescale
> > folk can provide acks etc that would be
From: Herbert Xu
Date: Wed, 9 Dec 2015 16:44:58 +0800
> On Wed, Dec 09, 2015 at 02:13:32PM +0530, Rameshwar Sahu wrote:
>>
>> Yes, we are not upstream in-kernel users right now, but later client
>> ma upstream there patches.
>
> Well I'd prefer to not take any crypto drivers that don't have
> in
On Wed, 2015-12-09 at 10:52 +0800, Herbert Xu wrote:
> On Wed, Dec 02, 2015 at 12:02:45PM -0800, Tim Chen wrote:
> >
> > +/*
> > + * CRYPTO_ALG_ASYNC flag is passed to indicate we have an ablk
> > + * scatter-gather walk.
> > + */
> > +
> > +static struct crypto_alg aes_cbc_mb_alg = {
> > + .cra_
On 12/7/2015 9:12 PM, Russell King wrote:
> Add a helper to map the source scatterlist into the descriptor.
>
> Signed-off-by: Russell King
After appending 07/11 ("crypto: caam: check and use dma_map_sg() return code")
as follows:
diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caa
On 12/7/2015 9:12 PM, Russell King wrote:
> Strictly, dma_map_sg() may coalesce SG entries, but in practise on iMX
> hardware, this will never happen. However, dma_map_sg() can fail, and
> we completely fail to check its return value. So, fix this properly.
>
> Arrange the code to map the scatte
On 12/7/2015 9:11 PM, Russell King - ARM Linux wrote:
> Here are further imx-caam updates that I've had since before the
> previous merge window. Please review and (I guess) if Freescale
> folk can provide acks etc that would be nice. Thanks.
Thanks Russell.
Note that the patch set does not app
On 12/7/2015 9:12 PM, Russell King wrote:
> Ensure that we clean up allocations and DMA mappings after encountering
> an error rather than just giving up and leaking memory and resources.
>
> Signed-off-by: Russell King
I guess the error cleanup code should be grouped under an "err" label,
inste
On Sun, Dec 06, 2015 at 02:51:37AM +0100, Jason A. Donenfeld wrote:
> Some ciphers actually support encrypting zero length plaintexts. For
> example, many AEAD modes support this. The resulting ciphertext for
> those winds up being only the authentication tag, which is a result of
> the key, the iv
On Sun, Dec 06, 2015 at 02:51:38AM +0100, Jason A. Donenfeld wrote:
> If the length of the plaintext is zero, there's no need to waste cycles
> on encryption and decryption. Using the chacha20poly1305 construction
> for zero-length plaintexts is a common way of using a shared encryption
> key for A
On Fri, Dec 04, 2015 at 04:56:12PM -0800, Tadeusz Struk wrote:
> The following series adds support for the new
> qat_c3xxx and qat_c62x acceleration devices.
>
> ---
> Pingchao Yang (1):
> crypto: qat - add support for new devices to FW loader
>
> Tadeusz Struk (6):
> crypto: qat - ad
On Thu, Dec 03, 2015 at 12:00:41PM -0800, Randy Dunlap wrote:
> From: Randy Dunlap
>
> Fix 21 occurrences of this kernel-doc warning in :
>
> ..//include/crypto/aead.h:149: warning: No description found for parameter
> 'base'
>
> Signed-off-by: Randy Dunlap
Patch applied. Thanks.
--
Email:
Hello
I have some comments below.
On Wed, Dec 09, 2015 at 06:16:42PM +0800, Zain Wang wrote:
> Add md5 sha1 sha256 support for crypto engine in rk3288.
> This patch can't support multiple updatings because of limited of IC,
> as result, it can't support import and export too.
>
> Signed-off-by:
Add md5 sha1 sha256 support for crypto engine in rk3288.
This patch can't support multiple updatings because of limited of IC,
as result, it can't support import and export too.
Signed-off-by: Zain Wang
---
Changes in V2:
- add some comments to code.
- fix some issues about zero message process.
On Wed, Dec 09, 2015 at 02:13:32PM +0530, Rameshwar Sahu wrote:
>
> Yes, we are not upstream in-kernel users right now, but later client
> ma upstream there patches.
Well I'd prefer to not take any crypto drivers that don't have
in-kernel users.
Cheers,
--
Email: Herbert Xu
Home Page: http://go
On Wed, Dec 9, 2015 at 1:57 PM, Herbert Xu wrote:
> On Wed, Dec 09, 2015 at 01:55:55PM +0530, Rameshwar Sahu wrote:
>>
>> Any comments on above patch ??
>
> My concern that there aren't going to be any in-kernel users remains.
Yes, we are not upstream in-kernel users right now, but later client
ma
On Wed, Dec 09, 2015 at 01:55:55PM +0530, Rameshwar Sahu wrote:
>
> Any comments on above patch ??
My concern that there aren't going to be any in-kernel users remains.
Cheers,
--
Email: Herbert Xu
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubk
Hi,
On Mon, Nov 16, 2015 at 2:42 PM, wrote:
> From: Rameshwar Prasad Sahu
>
> This patch implements support for APM X-Gene SoC CRC32C h/w accelerator driver
> and adds CRC32C computations support in dmaengine framework. APM X-Gene SoC
> has
> DMA engine capable of performing CRC32C computation
34 matches
Mail list logo