Hi Eric,
> This series introduces a helper function crypto_shash_tfm_digest() which
> replaces the following common pattern:
>
> {
> SHASH_DESC_ON_STACK(desc, tfm);
> int err;
>
> desc->tfm = tfm;
>
> err = crypto_shash_digest(desc,
From: Eric Biggers
The return value of xxh64_update() is pointless and confusing, since an
error is only returned for input==NULL. But the callers must ignore
this error because they might pass input=NULL, length=0.
Likewise for xxh32_update().
Just make these functions return void.
Cc: Nikol
From: Eric Biggers
crypto_shash_descsize() returns the size of the shash_desc context
needed to compute the hash, not the size of the hash itself.
crypto_shash_digestsize() would be correct, or alternatively using
c->hash_len and c->hmac_desc_len which already store the correct values.
But actua
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
crypto/essiv.c | 4 +---
1 file changed, 1 insertion
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Krzysztof Kozlowski
Cc: Vladimir Zapolskiy
Cc: Kamil Konieczny
Signed-off-by: E
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
drivers/crypto/mediatek/mtk-sha.c | 7 ++-
1 fil
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Zaibo Xu
Signed-off-by: Eric Biggers
---
drivers/crypto/hisilicon/sec2/sec_cryp
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
drivers/crypto/n2_core.c | 7 ++-
1 file changed
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: linux-blueto...@vger.kernel.org
Signed-off-by: Eric Biggers
---
net/bluetooth/sm
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Tom Lendacky
Signed-off-by: Eric Biggers
---
drivers/crypto/ccp/ccp-crypto-sha.
This series introduces a helper function crypto_shash_tfm_digest() which
replaces the following common pattern:
{
SHASH_DESC_ON_STACK(desc, tfm);
int err;
desc->tfm = tfm;
err = crypto_shash_digest(desc, data, len, out);
From: Eric Biggers
Currently the simplest use of the shash API is to use
crypto_shash_digest() to digest a whole buffer. However, this still
requires allocating a hash descriptor (struct shash_desc). Many users
don't really want to preallocate one and instead just use a one-off
descriptor on th
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Robert Baldyga
Cc: Krzysztof Opasiak
Signed-off-by: Eric Biggers
---
drivers/n
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Gilad Ben-Yossef
Signed-off-by: Eric Biggers
---
drivers/crypto/ccree/cc_cipher
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
arch/arm64/crypto/aes-glue.c | 4 +---
1 file change
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: linux-s...@vger.kernel.org
Signed-off-by: Eric Biggers
---
net/sctp/auth.c
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Jesper Nilsson
Cc: Lars Persson
Signed-off-by: Eric Biggers
---
drivers/crypto
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: ecryp...@vger.kernel.org
Signed-off-by: Eric Biggers
---
fs/ecryptfs/crypto.c |
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: linux-...@vger.kernel.org
Signed-off-by: Eric Biggers
---
fs/nfsd/nfs4recover.c
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: Cheng-Yi Chiang
Cc: Enric Balletbo i Serra
Cc: Guenter Roeck
Signed-off-by: Eri
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
fs/crypto/fname.c | 7 +--
fs/crypto/hkdf.c | 6
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: linux-...@lists.infradead.org
Signed-off-by: Eric Biggers
---
fs/ubifs/auth.c
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Cc: keyri...@vger.kernel.org
Signed-off-by: Eric Biggers
---
security/keys/encrypted
From: Eric Biggers
Instead of manually allocating a 'struct shash_desc' on the stack and
calling crypto_shash_digest(), switch to using the new helper function
crypto_shash_tfm_digest() which does this for us.
Signed-off-by: Eric Biggers
---
drivers/crypto/omap-sham.c | 20
right now, new drivers are adapted to crypto_acomp APIs rather than crypto_comp
APIs. Tradiontal compressors like lz4,lzo etc have been wrapped into acomp via
scomp backend as well.
To use the new hardware acceleration for compression, zswap should move to use
acomp APIs. Platforms without async ac
Hi Seth, Dan, Vitaly, Herbert,
Using crypto_comp APIs, zswap is not able to use the hardware accelators which
are only ported to cryto_acomp nowadays. So Mahipal Challa tried to solve this
problem by the below patch a long time ago:
mm: zswap - Add crypto acomp/scomp framework support [1]
At that
On Fri, May 01, 2020 at 09:42:29AM -0700, Eric Biggers wrote:
> From: Eric Biggers
>
> The SHA-256 / SHA-224 library functions can't fail, so remove the
> useless return value.
Looks good to me, and also matches the signatures of the blake2s library
functions, which return null.
Reviewed-by: Ja
Hi-
Over the past year or so I've observed that using sec=krb5i or
sec=krb5p with NFS/RDMA while testing my Linux NFS client and server
results in frequent connection loss. I've been able to pin this down
a bit.
The problem is that SUNRPC's calls into the kernel crypto functions
can sometimes res
Do not allow the crypto core to reschedule while processing RPC
requests. gss_krb5_crypto.c does make crypto API calls in process
context. However:
- When handling a received Call, rescheduling can introduce
latencies that result in processing delays causing a request to
fall outside the GSS seque
Hello,
syzbot found the following crash on:
HEAD commit:6a8b55ed Linux 5.7-rc3
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=11b9156410
kernel config: https://syzkaller.appspot.com/x/.config?x=5b075813ec8b93cd
dashboard link: https://syzkaller.appspot
From: Eric Biggers
The SHA-256 / SHA-224 library functions can't fail, so remove the
useless return value.
Also long as the declarations are being changed anyway, also fix some
parameter names in the declarations to match the definitions.
Signed-off-by: Eric Biggers
---
v2: remove unnecessary
On Fri, May 01, 2020 at 02:28:12PM +0200, Christophe Leroy wrote:
> > -extern int sha256_update(struct sha256_state *sctx, const u8 *input,
> > -unsigned int length);
> > -extern int sha256_final(struct sha256_state *sctx, u8 *hash);
> > +extern void sha256_update(struct sha256_
Le 01/05/2020 à 09:13, Eric Biggers a écrit :
From: Eric Biggers
The SHA-256 / SHA-224 library functions can't fail, so remove the
useless return value.
Also long as the declarations are being changed anyway, also fix some
parameter names in the declarations to match the definitions.
Signe
Thanks Gerg for review.
I have updated reported by and fixes tag properly now. Sent v2.
Thanks
Rajan
> -Original Message-
> From: Greg KH
> Sent: Friday, May 1, 2020 4:00 PM
> To: Rajan Vaja
> Cc: herb...@gondor.apana.org.au; da...@davemloft.net; Kalyani Akula
> ; Michal Simek ; Jolly
Return value of AES PM API is not handled which may result in
unexpected value of "status" in zynqmp_pm_aes_engine().
Consider "status" value as valid only if AES PM API is successful.
Fixes: bc86f9c54616 ("firmware: xilinx: Remove eemi ops for aes engine")
Reported-by: Stephen Rothwell
Signed-o
On Fri, May 01, 2020 at 03:14:51AM -0700, Rajan Vaja wrote:
> Fixes: bc86f9c54616 ("firmware: xilinx: Remove eemi ops for aes engine")
>
> Return value of AES PM API is not handled which may result in
> unexpected value of "status" in zynqmp_pm_aes_engine().
>
> Consider "status" value as valid o
Fixes: bc86f9c54616 ("firmware: xilinx: Remove eemi ops for aes engine")
Return value of AES PM API is not handled which may result in
unexpected value of "status" in zynqmp_pm_aes_engine().
Consider "status" value as valid only if AES PM API is successful.
Signed-off-by: Rajan Vaja
---
driver
From: Eric Biggers
The SHA-256 / SHA-224 library functions can't fail, so remove the
useless return value.
Also long as the declarations are being changed anyway, also fix some
parameter names in the declarations to match the definitions.
Signed-off-by: Eric Biggers
---
crypto/sha256_generic.
38 matches
Mail list logo