Re: [PATCH v3 7/7] crypto: AF_ALG - add support for key_id

2016-03-29 Thread Tadeusz Struk
Hi, On 03/29/2016 06:49 PM, kbuild test robot wrote: > Hi Tadeusz, > > [auto build test ERROR on v4.6-rc1] > [also build test ERROR on next-20160329] > [cannot apply to crypto/master] > [if your patch is applied to the wrong git tree, please drop us a note to > help

Re: [PATCH v3 7/7] crypto: AF_ALG - add support for key_id

2016-03-29 Thread kbuild test robot
Hi Tadeusz, [auto build test ERROR on v4.6-rc1] [also build test ERROR on next-20160329] [cannot apply to crypto/master] [if your patch is applied to the wrong git tree, please drop us a note to help improving the system] url: https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto

Re: [PATCH v3 7/7] crypto: AF_ALG - add support for key_id

2016-03-29 Thread kbuild test robot
Hi Tadeusz, [auto build test ERROR on v4.6-rc1] [also build test ERROR on next-20160329] [cannot apply to crypto/master] [if your patch is applied to the wrong git tree, please drop us a note to help improving the system] url: https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto

Re: [PATCH v3 7/7] crypto: AF_ALG - add support for key_id

2016-03-29 Thread kbuild test robot
Hi Tadeusz, [auto build test ERROR on v4.6-rc1] [also build test ERROR on next-20160329] [cannot apply to crypto/master] [if your patch is applied to the wrong git tree, please drop us a note to help improving the system] url: https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto

[PATCH v3 3/7] crypto: AF_ALG -- add asymmetric cipher interface

2016-03-29 Thread Tadeusz Struk
From: Stephan Mueller This patch adds the user space interface for asymmetric ciphers. The interface allows the use of sendmsg as well as vmsplice to provide data. This version has been rebased on top of 4.6 and a few chackpatch issues have been fixed. Signed-off-by:

[PATCH v3 7/7] crypto: AF_ALG - add support for key_id

2016-03-29 Thread Tadeusz Struk
This patch adds support for asymmetric key type to AF_ALG. It will work as follows: A new PF_ALG socket options are added on top of existing ALG_SET_KEY and ALG_SET_PUBKEY, namely ALG_SET_KEY_ID and ALG_SET_PUBKEY_ID for setting public and private keys respectively. When these new options will be

[PATCH v3 5/7] crypto: algif_akcipher - add ops_nokey

2016-03-29 Thread Tadeusz Struk
Similar to algif_skcipher and algif_hash, algif_akcipher needs to prevent user space from using the interface in an improper way. This patch adds nokey ops handlers, which do just that. Signed-off-by: Tadeusz Struk --- crypto/algif_akcipher.c | 159

[PATCH v3 1/7] crypto: AF_ALG -- add sign/verify API

2016-03-29 Thread Tadeusz Struk
From: Stephan Mueller Add the flags for handling signature generation and signature verification. Also, the patch adds the interface for setting a public key. Signed-off-by: Stephan Mueller Signed-off-by: Tadeusz Struk ---

[PATCH v3 6/7] crypto: KEYS - add public_key info query

2016-03-29 Thread Tadeusz Struk
It is needed to query the key capabilities and how to use the key correctly. In case of a key stored in HW (TPM) it can not be passed to the crypto API. For now it the public_key_info only contains information about where the key is stored, which is needed to prevent other modules, like AF_ALG,

[PATCH v3 4/7] crypto: algif_akcipher - enable compilation

2016-03-29 Thread Tadeusz Struk
From: Stephan Mueller Add the Makefile and Kconfig updates to allow algif_akcipher to be compiled. Signed-off-by: Stephan Mueller Signed-off-by: Tadeusz Struk --- crypto/Kconfig |9 + crypto/Makefile |1 + 2

[PATCH v3 2/7] crypto: AF_ALG -- add setpubkey setsockopt call

2016-03-29 Thread Tadeusz Struk
From: Stephan Mueller For supporting asymmetric ciphers, user space must be able to set the public key. The patch adds a new setsockopt call for setting the public key. Signed-off-by: Stephan Mueller Signed-off-by: Tadeusz Struk

[PATCH v3 0/7] crypto: algif - add akcipher

2016-03-29 Thread Tadeusz Struk
First four patches are a resend of the v3 algif_akcipher from Stephan Mueller, with minor changes after rebase on top of 4.6-rc1. The next three patches add support for keys stored in system keyring subsystem. First patch adds a public_key info struct that is used to query information about the

[PATCH] crypto: qat - changed adf_dev_stop to void

2016-03-29 Thread Tadeusz Struk
It returns always zero anyway. Signed-off-by: Tadeusz Struk --- drivers/crypto/qat/qat_c3xxx/adf_drv.c |4 +--- drivers/crypto/qat/qat_c3xxxvf/adf_drv.c |4 +--- drivers/crypto/qat/qat_c62x/adf_drv.c |4 +---

[PATCH] crypto: qat - explicitly stop all VFs first

2016-03-29 Thread Tadeusz Struk
When stopping devices it is not enought to loop backwards. We need to explicitly stop all VFs first. Signed-off-by: Tadeusz Struk --- drivers/crypto/qat/qat_common/adf_ctl_drv.c | 21 - 1 file changed, 20 insertions(+), 1 deletion(-) diff --git

[PATCH] crypto: qat - adf_dev_stop should not be called in atomic context

2016-03-29 Thread Tadeusz Struk
VFs call adf_dev_stop() from a PF to VF interrupt bottom half. This causes an oops "scheduling while atomic", because it tries to aquire a mutex to unregister crypto algorithms. This patch fixes the issue by calling adf_dev_stop() asynchronusely. Signed-off-by: Tadeusz Struk

[PATCH 03/10] x86/cpufeature: Kill cpu_has_osxsave

2016-03-29 Thread Borislav Petkov
From: Borislav Petkov Use boot_cpu_has() instead. Signed-off-by: Borislav Petkov Cc: linux-crypto@vger.kernel.org --- arch/x86/crypto/camellia_aesni_avx2_glue.c | 3 ++- arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +- arch/x86/crypto/serpent_avx2_glue.c|