On 9/17/18 3:04 PM, Dan Aloni wrote:
> That's also true, but what I still don't understand is how
> pkcs1pad_decrypt_complete() would be called when a higher layer calls to
> *encrypt* in roughly this API call sequence:
>
>ak_tfm = crypto_alloc_akcipher("pkcs1pad(rsa,sha256)", 0, 0);
>
On 9/17/18 1:28 PM, Dan Aloni wrote:
> On Mon, Sep 17, 2018 at 12:52:44PM -0700, Tadeusz Struk wrote:
>> On 9/17/18 10:24 AM, Dan Aloni wrote:
>>> The encryption mode of pkcs1pad never uses out_sg and out_buf, so
>>> there's no need to allocate the buffer, which pres
On 9/17/18 10:24 AM, Dan Aloni wrote:
> The encryption mode of pkcs1pad never uses out_sg and out_buf, so
> there's no need to allocate the buffer, which presently is not even
> being freed.
It is used and freed in pkcs1pad_decrypt_complete().
--
Tadeusz
On 03/01/2017 10:21 PM, Corentin Labbe wrote:
> I am finishing a patch that made testmgr test both (padded and unpadded).
Even if you patch the test vectors there is no guarantee that a user
of the API will always have the plain text padded.
It can be anything between 1 and the key size.
This
Hi Stephan,
On 03/01/2017 10:08 PM, Stephan Müller wrote:
>> memset(ptextp, 0, 256);
>> memcpy(ptextp + 64 - 8, ptext_ex, plen);
> I actually have tested that and it did not return the data the kernel
> implementation would return
It did for me:
Result 64 plen=8
63 1c cd 7b e1 7e e4 de
Hi Corentin,
On 03/01/2017 04:04 AM, Corentin Labbe wrote:
>> I would think the issue is that the OpenSSL BIGNUM lib has some issues: when
>> calculating m^e mod n, m has to be equal to the key size. The kernel's MPI
>> code handles the case where m is smaller than the key size.
>>
>> Note, in
Hi,
On 07/26/2016 04:54 AM, Stephan Mueller wrote:
>> > Is it true that the key (defined via setsockopt) is common to all the
>> > connections but the IV (defined through message control header) is
>> > specific to each connection ?
> Yes.
I think that's not correct. Please define a "connection".
wrong is that the child_req should be at
the end of the structure. This is build tested only.
---8<---
From: Tadeusz Struk <tadeusz.st...@intel.com>
Subject: [PATCH] crypto: rsa-pkcs1pad - fix rsa-pkcs1pad request struct
To allow for child request context the struct akcipher_request
On 07/08/2016 09:38 AM, Mat Martineau wrote:
> Are the inputs and outputs defined for ALG_OP_VERIFY in SET_KEY mode
> going to work for hardware keys (like TPM) in SET_KEY_ID mode? That's
> needed if the verify SET_KEY_ID mode is to be added later.
Yes, we will just need to change the
Hi Mat,
On 07/06/2016 12:38 PM, Mat Martineau wrote:
>> So it looks like the only thing that we need to return to the user in
>> this case is the return code. Do you agree?
>
> The way verify_signature is implemented today, the only output is the
> return code. For verify, maybe no read is
Hi Mat,
On 06/29/2016 11:43 AM, Mat Martineau wrote:
>> +ret = verify_signature(key, );
>> +if (!ret) {
>> +req->dst_len = sizeof(digest);
>
> I think you fixed the BUG_ON() problem but there's still an issue with
> the handling of the digest. Check the use of sig->digest in
>
On 06/24/2016 07:28 AM, Herbert Xu wrote:
> Didn't we add mpi_read_buffer specifically for akcipher before
> we switched over to SGs? If nobody is using it we should just
> delete it.
Yes, but now mpi_get_buffer() calls mpi_read_buffer() and it is also
used by security/keys/dh.c
Thanks,
--
TS
--
Add Giovanni and Salvatore who will take over the qat maintenance.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
MAINTAINERS | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index f4a9c13..5d813a3 100644
--- a/MAINTAINERS
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
n also removes the constrain on the output
buffer size.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 531 +++
1 file changed, 531 insertions(+)
create
From: Stephan Mueller <smuel...@chronox.de>
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk
or
invoke operations defined by a given subtype, depending on the
key type.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af_alg.c | 10 ++
crypto/algif_akcipher.c | 212 ++-
include/crypto/if_alg.h |1
i
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
compilation
Tadeusz Struk (2):
crypto: algif_akcipher - add ops_nokey
crypto: AF_ALG - add support for key_id
crypto/Kconfig |9
crypto/Makefile |1
crypto/af_alg.c | 28 +
crypto/algif_akcipher.c | 878
Hi Herbert,
On 06/22/2016 03:14 AM, Herbert Xu wrote:
> This was prompted by the caam RSA submission where a lot of work
> was done just to strip the RSA output of leading zeroes. This is
> in fact completely pointless because the only user of RSA in the
> kernel then promptly puts them back.
>
On 06/09/2016 11:36 AM, Stephan Mueller wrote:
> Am Donnerstag, 9. Juni 2016, 11:27:13 schrieb Mat Martineau:
>
> Hi Mat, Tadeusz,
>
>> On Thu, 9 Jun 2016, Stephan Mueller wrote:
>>> Am Donnerstag, 9. Juni 2016, 11:18:04 schrieb Mat Martineau:
>>>
>>> Hi Mat,
>>>
> Or is your concern that
Hi Mat,
On 05/25/2016 05:45 PM, Mat Martineau wrote:
>
> On Sat, 14 May 2016, Tadeusz Struk wrote:
>
>> diff --git a/crypto/algif_akcipher.c b/crypto/algif_akcipher.c
>> index e00793d..6733df1 100644
>> --- a/crypto/algif_akcipher.c
>> +++ b/crypto/algif_akcipher
On 05/18/2016 08:57 AM, Gary R Hook wrote:
> Yes, thank you. After spending more time wandering through rsa.c &
> rsa_helper.c
> I have come to realize that I have been laboring under a paradigm imposed by
> my implementation requirements. Now that I have that cleared up, the answer to
> my
On 05/17/2016 03:16 PM, Stephan Mueller wrote:
>> I am working on hooking up RSA functionality to the akcipher API. It appears
>> > that no other code, to date, uses this API. Can anyone confirm or deny that
>> > conclusion?
> This is not correct. The asymmetric key API uses that code. So does the
The sizeof(*ctx->dec_cd) and sizeof(*ctx->enc_cd) are equal,
but we should use the correct one for freeing memory anyway.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/qat_algs.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
On 05/14/2016 09:16 PM, Tadeusz Struk wrote:
> First four patches are a resend of the v3 algif_akcipher from
> Stephan Mueller, with minor changes after rebase on top of 4.6-rc1.
>
> The next three patches add support for keys stored in system
> keyring subsystem.
>
Hi Mat,
On 05/13/2016 04:32 PM, Mat Martineau wrote:
>
>> +params.data_len = req->src_len;
>> +params.enc_len = req->dst_len;
Thanks for info. I have sent an update for this.
>
> The params member names have changed (now in_len and out_len).
>> +ret = encrypt_blob(, in, out);
>
>
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
From: Stephan Mueller
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller
---
crypto/af_alg.c | 18
ed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 542 +++
1 file changed, 542 insertions(+)
create mode 100644 crypto/algif_akcipher.c
diff --git a/crypto/algif_a
akcipher api or
invoke operations defined by a given subtype, depending on the
key type.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af_alg.c | 10 ++
crypto/algif_akcipher.c | 207 ++-
include/crypto/if
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
):
crypto: AF_ALG -- add sign/verify API
crypto: AF_ALG -- add setpubkey setsockopt call
crypto: AF_ALG -- add asymmetric cipher interface
crypto: algif_akcipher - enable compilation
Tadeusz Struk (2):
crypto: algif_akcipher - add ops_nokey
crypto: AF_ALG - add
On 05/11/2016 04:50 PM, Mat Martineau wrote:
>
>> +len = crypto_akcipher_maxsize(tfm);
>> +info->key_size = len * 8;
>> +info->max_data_size = len;
>> +info->max_sig_size = len;
>> +info->max_enc_size = len;
>> +info->max_dec_size = len;
>
> If len > UINT16_MAX, should
On 05/11/2016 06:55 AM, David Howells wrote:
> Tadeusz Struk <tadeusz.st...@intel.com> wrote:
>
>>> (2) rsa-pkcs1pad needs to indicate what the maximum content size is, given
>>> the minimum possible padding for the specified hash type (ie. a
>>>
change the adf_ctl_stop_devices to void
Change the adf_ctl_stop_devices to a void function.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 9 +++--
1 file changed, 3 insertions(+), 6 deletions(-)
diff --git a/drivers/crypto/qat/qat_common/adf_ctl_drv.
Hi David,
On 05/09/2016 02:13 AM, David Howells wrote:
> Hi Tadeusz, Andrzej,
>
> If you look here:
>
> http://git.kernel.org/cgit/linux/kernel/git/dhowells/keyutils.git
>
> you will see a branch labelled 'pkey'. This, so far, provides query support
> through keyctl:
>
>
On 05/09/2016 12:24 PM, Stephan Mueller wrote:
> Am Montag, 9. Mai 2016, 12:17:21 schrieb Tadeusz Struk:
>
> Hi Tadeusz,
>
>> On 05/09/2016 12:02 PM, Stephan Mueller wrote:
>>> One followup: is the final memcmp() between the decrypted hash and the
>>> hash o
On 05/09/2016 12:02 PM, Stephan Mueller wrote:
> One followup: is the final memcmp() between the decrypted hash and the hash
> of
> the message implemented in the RSA verify code path? At least I do not see it
> right away.
It's in line #549
--
TS
--
To unsubscribe from this list: send the
On 05/09/2016 11:50 AM, Stephan Mueller wrote:
> I think I see my error: pkcs1pad(rsa,HASH) -- I missed the hash part that
> activates the decoding. Thank you for the pointer.
>
> Once I completed my testing, I think I need to beef up the documentation a
> bit.
Right, this can work in two
Hi Strphan,
On 05/09/2016 03:24 AM, Stephan Mueller wrote:
> Hi,
>
> I am experimenting with pkcs1pad(rsa-generic) signature verify. The following
> numbers shall serve as examples -- using other valid signatures, similar
> results are visible.
>
> All signatures are correct.
>
> The result
ed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 542 +++
1 file changed, 542 insertions(+)
create mode 100644 crypto/algif_akcipher.c
diff --git a/crypto/algif_a
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
akcipher api or
invoke operations defined by a given subtype, depending on the
key type.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af_alg.c | 10 ++
crypto/algif_akcipher.c | 207 ++-
include/crypto/if
From: Stephan Mueller
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller
---
crypto/af_alg.c | 18
-- add setpubkey setsockopt call
crypto: AF_ALG -- add asymmetric cipher interface
crypto: algif_akcipher - enable compilation
Tadeusz Struk (2):
crypto: algif_akcipher - add ops_nokey
crypto: AF_ALG - add support for key_id
crypto/Kconfig |9
crypto/Makefile
On 05/05/2016 02:50 AM, Herbert Xu wrote:
> On Thu, May 05, 2016 at 12:40:18PM +0300, Anatoly Pugachev wrote:
>>
>> sure, based on your cryptodev git, just tried 4.3 (6a13feb , good)
>> kernel in attempt to find (bisect) when RSA code break, already tested
>> 4.5 (44d1b6d , bad) , 4.4 (afd2ff9 ,
On 05/05/2016 08:31 AM, Anatoly Pugachev wrote:
> On Thu, May 5, 2016 at 6:00 PM, Tadeusz Struk <tadeusz.st...@intel.com> wrote:
>> On 05/05/2016 02:40 AM, Anatoly Pugachev wrote:
>>> sure, based on your cryptodev git, just tried 4.3 (6a13feb , good)
>>> kernel in
On 05/05/2016 02:40 AM, Anatoly Pugachev wrote:
> sure, based on your cryptodev git, just tried 4.3 (6a13feb , good)
> kernel in attempt to find (bisect) when RSA code break, already tested
> 4.5 (44d1b6d , bad) , 4.4 (afd2ff9 , bad).
> Going to try your patch soon (when I'm back home).
> So far
Hi Anatoly,
On 05/04/2016 12:10 PM, Anatoly Pugachev wrote:
> we're using 4.5.2 debian kernel here without this problem. I'm not
> sure I would be able to bisect, never did it before, but I could
> try...
On 4.5.2 could you try "modprobe rsa"
--
TS
--
To unsubscribe from this list: send the
pkcs1pad template needs CRYPTO_MANAGER so it needs
to be explicitly selected by CRYPTO_RSA.
Reported-by: Jamie Heilman <ja...@audible.transient.net>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/crypto/Kco
On 05/03/2016 07:26 PM, Jamie Heilman wrote:
>>> Alrighty, presumably relevant bits:
>>> > >
>>> > > X.509: Cert Issuer: Build time autogenerated kernel key
>>> > > X.509: Cert Subject: Build time autogenerated kernel key
>>> > > X.509: Cert Key Algo: rsa
>>> > > X.509: Cert Valid period:
Hi Jamie,
On 05/03/2016 01:35 PM, David Howells wrote:
> (cc'ing Tadeusz as he did the pkcs1 padding function)
>
> Jamie Heilman wrote:
>
Problem loading in-kernel X.509 certificate (-2)
>>>
>>> ENOENT? Hmmm... The only place that is generated is in the
Fix copy and paste typo adf_isr.c
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_isr.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/qat/qat_common/adf_isr.c
b/drivers/crypto/qat/qat_common/adf_isr.c
The adf_vf_isr.c should only be build if CONFIG_PCI_IOV is enabled
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/Makefile | 4 ++--
drivers/crypto/qat/qat_common/adf_common_drv.h | 14 --
2 files changed, 14 insertions
Fix undefined reference issue reported by kbuild test robot.
Reported-by: kbuild test robot <fengguang...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_common_drv.h | 13 +++--
1 file changed, 11 insertions(+),
The pf2vf_resp_wq is a global so it has to be created at init
and destroyed at exit, instead of per device.
Cc: <sta...@vger.kernel.org>
Tested-by: Suresh Marikkannu <sureshx.marikka...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/cry
;
> url:
> https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto-algif-add-akcipher/20160416-043207
> base:
> https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
> master
> config: i386-allmodconfig (attached as .config)
> reproduce:
>
On 04/15/2016 12:52 PM, kbuild test robot wrote:
> tree:
> https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
> master
> head: 5f575efea79caae69b81f922d99b221302a2c003
> commit: d6064165ba4449ea085a389724d728258a3180ec [43/49] crypto: qat -
> adf_dev_stop should not
From: Stephan Mueller <smuel...@chronox.de>
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
ed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 542 +++
1 file changed, 542 insertions(+)
create mode 100644 crypto/algif_akcipher.c
diff --git a/crypto/algif_a
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
---
Stephan Mueller (4):
crypto: AF_ALG -- add sign/verify API
crypto: AF_ALG -- add setpubkey setsockopt call
crypto: AF_ALG -- add asymmetric cipher interface
crypto: algif_akcipher - enable compilation
Tadeusz Struk (2):
crypto: algif_akcipher - add ops_nokey
or
invoke operations defined by a given subtype, depending on the
key type.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af_alg.c | 10 ++
crypto/algif_akcipher.c | 207 ++-
include/crypto/if_alg.h |1
i
Hi David,
On 04/14/2016 03:00 PM, David Howells wrote:
> diff --git a/crypto/asymmetric_keys/signature.c
> b/crypto/asymmetric_keys/signature.c
> index 11b7ba170904..8ecbeda16b53 100644
> --- a/crypto/asymmetric_keys/signature.c
> +++ b/crypto/asymmetric_keys/signature.c
Since this file
Subject: [PATCH] crypto: qat - fix section mismatch warning
Fix Section mismatch warinig in adf_exit_vf_wq()
Reported-by: kbuild test robot <fengguang...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_vf_isr.c | 2 +-
1 fil
Before VF sends a signal to PF it should check if PF
is still running.
Tested-by: Suman Bangalore Sathyanarayana
<sumanx.bangalore.sathyanaray...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 2 ++
driver
IRQs need to be enabled when VFs go down in case some VF to PF
comms happens.
Tested-by: Suman Bangalore Sathyanarayana
<sumanx.bangalore.sathyanaray...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_init.c | 3 ++-
1 fil
The vf2pf_init and vf2pf_exit are exactly the same for all VFs
so move them to common and reuse.
Tested-by: Suman Bangalore Sathyanarayana
<sumanx.bangalore.sathyanaray...@intel.com>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
.../crypto/qat/qat_c3xxxvf/adf_c3xxx
Hi Fridolin,
On 04/12/2016 04:13 AM, Fridolin Pokorny wrote:
> we were experimenting with this. We have a prove of concept of a kernel
> TLS type socket, so called AF_KTLS, which is based on Dave Watson's
> RFC5288 patch. It handles both TLS and DTLS, unfortunately it is not
> ready now to be
On 04/12/2016 03:10 PM, David Howells wrote:
>> +/**
>> > + * asymmetric_key_verify_signature - invoke verify signature operation on
>> > a key
>> > + * of the asymmetric subtype
>> > + * @key: key from the system keyring
>> > + * @sig: signature to verify
>> >
The output buffer length has to be at least as big as the key_size.
It is then updated to the actual output size by the implementation.
Cc: <sta...@vger.kernel.org>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/rsa-pkcs1pad.c | 12 ++--
1 file changed,
work queue.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_common/adf_common_drv.h |2 +
drivers/crypto/qat/qat_common/adf_ctl_drv.c|6 ++
drivers/crypto/qat/qat_common/adf_vf_isr.c | 59 +++-
3 files changed, 64
Hi Herbert,
On 04/05/2016 04:29 AM, Herbert Xu wrote:
> On Sat, Mar 05, 2016 at 05:20:44PM -0800, Tadeusz Struk wrote:
>> > Hi,
>> > The following series adds TLS type authentication. To do this a new
>> > template, encauth, is introduced. It is derived from the
Hi Herbert,
On 03/29/2016 10:20 AM, Tadeusz Struk wrote:
> VFs call adf_dev_stop() from a PF to VF interrupt bottom half.
> This causes an oops "scheduling while atomic", because it tries
> to aquire a mutex to unregister crypto algorithms.
> This patch fixes the issue b
From: Stephan Mueller <smuel...@chronox.de>
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk
This adds generic sign, verify, encrypt, decrypt accessor
functions to the asymmetric key type. These will be defined by
asymmetric subtypes, similarly to how public_key currently defines
the verify_signature function.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
or
invoke operations defined by a given subtype, depending on the
key type.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af_alg.c | 10 +++
crypto/algif_akcipher.c | 146 ++-
include/crypto/if_alg.h |1
i
ed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 542 +++
1 file changed, 542 insertions(+)
create mode 100644 crypto/algif_akcipher.c
diff --git a/crypto/algif_a
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
to base_req
- dropped 3/3
---
Stephan Mueller (4):
crypto: AF_ALG -- add sign/verify API
crypto: AF_ALG -- add setpubkey setsockopt call
crypto: AF_ALG -- add asymmetric cipher interface
crypto: algif_akcipher - enable compilation
Tadeusz Struk (3):
crypto: algif_akcipher
Hi David,
On 03/30/2016 09:31 AM, David Howells wrote:
>> +keyring = request_key(_type_asymmetric, key_name, NULL);
>> > +
>> > + err = -ENOKEY;
>> > + if (IS_ERR(keyring))
>> > + goto out;
>> > +
>> > + pkey = keyring->payload.data[asym_crypto];
> NAK. This is liable to crash in
improving the system]
>
> url:
> https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto-algif-add-akcipher/20160330-090754
> config: i386-randconfig-i1-03292045 (attached as .config)
> reproduce:
> # save the attached .config to linux build tree
> make AR
ed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c | 542 +++
1 file changed, 542 insertions(+)
create mode 100644 crypto/algif_akcipher.c
diff --git a/crypto/algif_a
crypto API functions, either the
crypto_akcipher_set_priv_key or the crypto_akcipher_set_pub_key,
depending on the used option. Subsequently the asymmetric key
will be freed and return code returned back to the user.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/af
Similar to algif_skcipher and algif_hash, algif_akcipher needs
to prevent user space from using the interface in an improper way.
This patch adds nokey ops handlers, which do just that.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/algif_akcipher.c
From: Stephan Mueller <smuel...@chronox.de>
Add the flags for handling signature generation and signature
verification.
Also, the patch adds the interface for setting a public key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.
it, etc.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/asymmetric_keys/x509_cert_parser.c |1 +
include/crypto/public_key.h | 31 +
2 files changed, 32 insertions(+)
diff --git a/crypto/asymmetric_keys/x509_cert_parse
From: Stephan Mueller <smuel...@chronox.de>
Add the Makefile and Kconfig updates to allow algif_akcipher to be
compiled.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
crypto/Kconfig |9 +
crypto/Ma
From: Stephan Mueller <smuel...@chronox.de>
For supporting asymmetric ciphers, user space must be able to set the
public key. The patch adds a new setsockopt call for setting the public
key.
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Tadeusz Struk
API
crypto: AF_ALG -- add setpubkey setsockopt call
crypto: AF_ALG -- add asymmetric cipher interface
crypto: algif_akcipher - enable compilation
Tadeusz Struk (3):
crypto: algif_akcipher - add ops_nokey
crypto: KEYS - add public_key info query
crypto: AF_ALG
It returns always zero anyway.
Signed-off-by: Tadeusz Struk <tadeusz.st...@intel.com>
---
drivers/crypto/qat/qat_c3xxx/adf_drv.c |4 +---
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c |4 +---
drivers/crypto/qat/qat_c62x/adf_drv.c |4 +---
drivers/cryp
1 - 100 of 525 matches
Mail list logo