Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Steffen Klassert
On Wed, May 27, 2015 at 04:01:05PM +0800, Herbert Xu wrote: Hi: The only changes from the last version are that set_ad no longer takes a cryptoff argument and testmgr has been updated to always supply space for the authentication tag. The algif_aead patch has been removed and will be

Re: crypto: algif_aead - Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 12:10:03PM +0200, Stephan Mueller wrote: - -if (ctx-enc) { -/* round up output buffer to multiple of block size */ -outlen = ((used + bs - 1) / bs * bs); Why wouldn't the round up for the output not be needed any more? If the caller

Re: [PATCH v3 14/16] ARM: marvell/dt: enable crypto on armada-xp-gp

2015-05-27 Thread Gregory CLEMENT
Hi Thomas, Boris, On 27/05/2015 13:23, Thomas Petazzoni wrote: Dear Gregory CLEMENT, On Wed, 27 May 2015 12:20:49 +0200, Gregory CLEMENT wrote: But is it really depending of the board itself? I see that the first lines are the same on all the dts, I just remember that there was a reason

Re: [PATCH v3 02/16] crypto: add a new driver for Marvell's CESA

2015-05-27 Thread Imre Kaloz
On Mon, 25 May 2015 13:17:13 +0200, Boris Brezillon boris.brezil...@free-electrons.com wrote: Sorry, I didn't word it right - the series is missing the crypto nodes for the orion, 375 and 38x platforms. I only add nodes for platforms I have tested on. If you're able to test on those

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Johannes Berg
On Wed, 2015-05-27 at 17:07 +0800, Herbert Xu wrote: On Wed, May 27, 2015 at 11:00:40AM +0200, Johannes Berg wrote: Right. Unfortunately, I can't typically rely on being able to make changes to the kernel our driver is built against, and I don't think we could do these changes otherwise.

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Johannes Berg
On Wed, 2015-05-27 at 16:39 +0800, Herbert Xu wrote: On Wed, May 27, 2015 at 10:15:50AM +0200, Johannes Berg wrote: Do you think it'd be feasible at all to somehow override the aead_request_set_crypt() and aead_request_set_ad() functions or so to do something that works on older kernels

Re: [PATCH 2/11] crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd

2015-05-27 Thread Stephan Mueller
Am Mittwoch, 27. Mai 2015, 14:37:27 schrieb Herbert Xu: Hi Herbert, We need to call sg_init_table as otherwise the first entry may inadvertently become the last. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au Although the following remark is to the previous patch to add

Re: [PATCH] crypto: nx - tweak Makefile dependencies

2015-05-27 Thread Herbert Xu
On Mon, May 25, 2015 at 02:45:16PM +1000, Cyril Bur wrote: Selecting CRYPTO_DEV_NX causes a conditional include of nx/Kconfig but options within nx/Kconfig do not depend on it. The included options should depend on CRYPTO_DEV_NX since currently CRYPTO_DEV_NX cannot be built for little endian.

[cryptodev:master 158/160] crypto/jitterentropy.c:133:2: error: implicit declaration of function 'timekeeping_valid_for_hres'

2015-05-27 Thread kbuild test robot
tree: git://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master head: d725332208ef13241fc435eece790c9d0ea16a4e commit: bb5530e4082446aac3a3d69780cd4dbfa4520013 [158/160] crypto: jitterentropy - add jitterentropy RNG config: i386-randconfig-r1-0527 (attached as .config)

Re: [PATCH 03/13] serial: 8250_dma: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Peter Ujfalusi
On 05/27/2015 01:41 PM, Peter Ujfalusi wrote: On 05/26/2015 05:44 PM, Greg Kroah-Hartman wrote: On Tue, May 26, 2015 at 04:25:58PM +0300, Peter Ujfalusi wrote: Switch to use ma_request_slave_channel_compat_reason() to request the DMA channels. In case of error, return the error code we

Re: [PATCH 03/13] serial: 8250_dma: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Peter Ujfalusi
On 05/26/2015 06:08 PM, Tony Lindgren wrote: * Peter Ujfalusi peter.ujfal...@ti.com [150526 06:28]: Switch to use ma_request_slave_channel_compat_reason() to request the DMA channels. In case of error, return the error code we received including -EPROBE_DEFER Signed-off-by: Peter Ujfalusi

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 11:00:40AM +0200, Johannes Berg wrote: Right. Unfortunately, I can't typically rely on being able to make changes to the kernel our driver is built against, and I don't think we could do these changes otherwise. You could provide your own version of crypto_aead_encrypt

Re: [PATCH v3 14/16] ARM: marvell/dt: enable crypto on armada-xp-gp

2015-05-27 Thread Gregory CLEMENT
On 26/05/2015 10:59, Boris Brezillon wrote: On Mon, 25 May 2015 17:10:37 +0200 Gregory CLEMENT gregory.clem...@free-electrons.com wrote: Hi Boris, On 22/05/2015 15:34, Boris Brezillon wrote: Enable the crypto IP on armada-xp-gp. Signed-off-by: Boris Brezillon

Re: [PATCH v3 14/16] ARM: marvell/dt: enable crypto on armada-xp-gp

2015-05-27 Thread Thomas Petazzoni
Dear Gregory CLEMENT, On Wed, 27 May 2015 12:20:49 +0200, Gregory CLEMENT wrote: But is it really depending of the board itself? I see that the first lines are the same on all the dts, I just remember that there was a reason why we could not put it in the dtsi. Yes, because the DT language

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Johannes Berg
The conversion of in-tree users is fairly straightforward. It is pretty much - but a related question (that you totally don't have to answer if you don't want to think about this). I'm going to have to (continue) backport(ing) this code to older kernels for customer support, and I prefer

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 10:15:50AM +0200, Johannes Berg wrote: Do you think it'd be feasible at all to somehow override the aead_request_set_crypt() and aead_request_set_ad() functions or so to do something that works on older kernels (and thus older crypto subsystems) or do you think I just

crypto: algif_aead - Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. Note that the user-space interface now requires both input and output to be of the same length, and both must include space for the AD as well as the authentication tag.

Re: [PATCH v1 3/3] crypto: ccp - Protect against poorly marked end of sg list

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 05:43:05PM +0800, Herbert Xu wrote: Tom Lendacky thomas.lenda...@amd.com wrote: Scatter gather lists can be created with more available entries than are actually used (e.g. using sg_init_table() to reserve a specific number of sg entries, but in actuality using

Re: [PATCH 2/11] crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 11:00:55AM +0200, Stephan Mueller wrote: Shouldn't there be a check for src == NULL here? I see the scatterwalk_ffwd being used in the IV generators where they simply use the AD len and others. For AF_ALG, those values may be set by user space in a deliberately wrong

Re: [v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Steffen Klassert
On Wed, May 27, 2015 at 05:29:22PM +0800, Herbert Xu wrote: On Wed, May 27, 2015 at 11:25:33AM +0200, Steffen Klassert wrote: Not sure if I missed something in the flood of patches, but if I apply your v3 patchset on top of the cryptodev tree, it crashes like that buring boot: Sorry,

Re: [PATCH v1 0/3] crypto: ccp - CCP driver updates 2015-05-26

2015-05-27 Thread Herbert Xu
On Tue, May 26, 2015 at 01:06:13PM -0500, Tom Lendacky wrote: The following patches are included in this driver update series: - Remove the checking and setting of the device dma_mask field - Remove an unused field from a structure to help avoid any confusion - Protect against poorly marked

Re: [PATCH 11/13] spi: omap2-mcspi: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Peter Ujfalusi
Mark, On 05/26/2015 06:27 PM, Mark Brown wrote: On Tue, May 26, 2015 at 04:26:06PM +0300, Peter Ujfalusi wrote: Switch to use ma_request_slave_channel_compat_reason() to request the DMA channels. Only fall back to pio mode if the error code returned is not -EPROBE_DEFER, otherwise return

Re: crypto: algif_aead - Switch to new AEAD interface

2015-05-27 Thread Stephan Mueller
Am Mittwoch, 27. Mai 2015, 17:24:41 schrieb Herbert Xu: Hi Herbert, - - if (ctx-enc) { - /* round up output buffer to multiple of block size */ - outlen = ((used + bs - 1) / bs * bs); Why wouldn't the round up for the output not be needed any more? If the caller

Re: [PATCH 03/13] serial: 8250_dma: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Peter Ujfalusi
On 05/26/2015 05:44 PM, Greg Kroah-Hartman wrote: On Tue, May 26, 2015 at 04:25:58PM +0300, Peter Ujfalusi wrote: Switch to use ma_request_slave_channel_compat_reason() to request the DMA channels. In case of error, return the error code we received including -EPROBE_DEFER I think you typed

Re: [PATCH 2/11] crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd

2015-05-27 Thread Stephan Mueller
Am Mittwoch, 27. Mai 2015, 17:08:55 schrieb Herbert Xu: Hi Herbert, On Wed, May 27, 2015 at 11:00:55AM +0200, Stephan Mueller wrote: Shouldn't there be a check for src == NULL here? I see the scatterwalk_ffwd being used in the IV generators where they simply use the AD len and others. For

Re: [PATCH 2/11] crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 01:24:48PM +0200, Stephan Mueller wrote: To be precise, the concern I currently have are as follows. But I will test it later and report back: The seqiv.c uses the following call: scatterwalk_ffwd(dstbuf, req-dst,

[PATCH] crypto: jitterentropy - remove timekeeping_valid_for_hres

2015-05-27 Thread Stephan Mueller
The patch removes the use of timekeeping_valid_for_hres which is now marked as internal for the time keeping subsystem. The jitterentropy does not really require this verification as a coarse timer (when random_get_entropy is absent) is discovered by the initialization test of jent_entropy_init,

Re: [PATCH 0/8] ARM: mvebu: Add support for RAID6 PQ offloading

2015-05-27 Thread Boaz Harrosh
On 05/26/2015 07:31 PM, Dan Williams wrote: [ adding Boaz as this discussion has implications for ore_raid ] You're not talking about deprecating it, you're talking about removing it entirely. True, and adding more users makes that removal more difficult. I'm willing to help out on the

[ipsec PATCH 0/3] Preserve skb-mark through VTI tunnels

2015-05-27 Thread Alexander Duyck
These patches are meant to try and address the fact the VTI tunnels are currently overwriting the skb-mark value. I am generally happy with the first two patches, however the third patch still modifies the skb-mark, though it undoes after the fact. The main problem I am trying to address is the

Re: [PATCH v1 3/3] crypto: ccp - Protect against poorly marked end of sg list

2015-05-27 Thread Tom Lendacky
On 05/27/2015 04:43 AM, Herbert Xu wrote: Tom Lendacky thomas.lenda...@amd.com wrote: Scatter gather lists can be created with more available entries than are actually used (e.g. using sg_init_table() to reserve a specific number of sg entries, but in actuality using something less than that

Re: [PATCH v1 3/3] crypto: ccp - Protect against poorly marked end of sg list

2015-05-27 Thread Tom Lendacky
On 05/27/2015 04:45 AM, Herbert Xu wrote: On Wed, May 27, 2015 at 05:43:05PM +0800, Herbert Xu wrote: Tom Lendacky thomas.lenda...@amd.com wrote: Scatter gather lists can be created with more available entries than are actually used (e.g. using sg_init_table() to reserve a specific number of

[ipsec PATCH 2/3] xfrm: Override skb-mark with tunnel-parm.i_key in xfrm_input

2015-05-27 Thread Alexander Duyck
This change makes it so that if a tunnel is defined we just use the mark from the tunnel instead of the mark from the skb header. By doing this we can avoid the need to set skb-mark inside of the tunnel receive functions. Signed-off-by: Alexander Duyck alexander.h.du...@redhat.com ---

[ipsec PATCH 3/3] ip_vti/ip6_vti: Preserve skb-mark after rcv_cb call

2015-05-27 Thread Alexander Duyck
The vti6_rcv_cb and vti_rcv_cb calls were leaving the skb-mark modified after completing the function. This resulted in the original skb-mark value being lost. Since we only need skb-mark to be set for xfrm_policy_check we can pull the assignment into the rcv_cb calls and then just restore the

[ipsec PATCH 1/3] ip_vti/ip6_vti: Do not touch skb-mark on xmit

2015-05-27 Thread Alexander Duyck
Instead of modifying skb-mark we can simply modify the flowi_mark that is generated as a result of the xfrm_decode_session. By doing this we don't need to actually touch the skb-mark and it can be preserved as it passes out through the tunnel. Signed-off-by: Alexander Duyck

Re: [PATCH 11/13] spi: omap2-mcspi: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Mark Brown
On Tue, May 26, 2015 at 04:26:06PM +0300, Peter Ujfalusi wrote: Switch to use ma_request_slave_channel_compat_reason() to request the DMA channels. Only fall back to pio mode if the error code returned is not -EPROBE_DEFER, otherwise return from the probe with the -EPROBE_DEFER. Acked-by: Mark

Re: [PATCH 13/13] ASoC: omap-pcm: Switch to use dma_request_slave_channel_compat_reason()

2015-05-27 Thread Mark Brown
On Tue, May 26, 2015 at 04:26:08PM +0300, Peter Ujfalusi wrote: dmaengine provides a wrapper function to handle DT and non DT boots when requesting DMA channel. Use that instead of checking for of_node in the platform driver. Acked-by: Mark Brown broo...@kernel.org signature.asc Description:

Re: [PATCH 11/13] spi: omap2-mcspi: Support for deferred probing when requesting DMA channels

2015-05-27 Thread Mark Brown
On Wed, May 27, 2015 at 02:15:12PM +0300, Peter Ujfalusi wrote: I have put the maintainers of the relevant subsystems as CC in the commit message and sent the series to all of the mailing lists. This series was touching 7 subsystems and I thought not spamming every maintainer with all the

[PATCH] xfrm6: Do not use xfrm_local_error for path MTU issues in tunnels

2015-05-27 Thread Alexander Duyck
This change makes it so that we use icmpv6_send to report PMTU issues back into tunnels in the case that the resulting packet is larger than the MTU of the outgoing interface. Previously xfrm_local_error was being used in this case, however this was resulting in no changes, I suspect due to the

[PATCH 0/11] crypto: aead - Tweaks/fixes to new AEAD interface

2015-05-27 Thread Herbert Xu
Hi: Previously the AD was required to exist in both the source and destination buffers. This creates a rather confusing situation where the destination served as both input as well as output. This series rectifies by allowing the destination to contain the AD (e.g., it always does for in-place

[PATCH 2/11] crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd

2015-05-27 Thread Herbert Xu
We need to call sg_init_table as otherwise the first entry may inadvertently become the last. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/scatterwalk.c |1 + 1 file changed, 1 insertion(+) diff --git a/crypto/scatterwalk.c b/crypto/scatterwalk.c index 8690324..2ef9cbb

[PATCH 9/11] crypto: seqiv - Use common IV generation code

2015-05-27 Thread Herbert Xu
This patch makes use of the new common IV generation code. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/seqiv.c | 92 ++--- 1 file changed, 36 insertions(+), 56 deletions(-) diff --git a/crypto/seqiv.c b/crypto/seqiv.c

[PATCH 7/11] crypto: echainiv - Fix IV size in context size calculation

2015-05-27 Thread Herbert Xu
This patch fixes a bug in the context size calculation where we were still referring to the old cra_aead. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/echainiv.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/echainiv.c b/crypto/echainiv.c

[PATCH 6/11] crypto: echainiv - Use common IV generation code

2015-05-27 Thread Herbert Xu
This patch makes use of the new common IV generation code. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/echainiv.c | 230 -- 1 file changed, 18 insertions(+), 212 deletions(-) diff --git a/crypto/echainiv.c

[PATCH 1/11] crypto: aead - Document behaviour of AD in destination buffer

2015-05-27 Thread Herbert Xu
This patch defines the behaviour of AD in the new interface more clearly. In particular, it specifies that if the user must copy the AD to the destination manually when src != dst if they wish to guarantee that the destination buffer contains a copy of the AD. The reason for this is that

[PATCH 10/11] crypto: seqiv - Fix IV size in context size calculation

2015-05-27 Thread Herbert Xu
This patch fixes a bug in the context size calculation where we were still referring to the old cra_aead. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/seqiv.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/seqiv.c b/crypto/seqiv.c index

[PATCH 11/11] crypto: seqiv - Fix module unload/reload crash

2015-05-27 Thread Herbert Xu
On module unload we weren't unregistering the seqniv template, thus leading to a crash the next time someone walks the template list. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/seqiv.c |1 + 1 file changed, 1 insertion(+) diff --git a/crypto/seqiv.c b/crypto/seqiv.c

[PATCH 4/11] crypto: aead - Add common IV generation code

2015-05-27 Thread Herbert Xu
This patch adds some common IV generation code currently duplicated by seqiv and echainiv. For example, the setkey and setauthsize functions are completely identical. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/aead.c | 205

[PATCH 3/11] crypto: aead - Preserve in-place processing in old_crypt

2015-05-27 Thread Herbert Xu
This patch tries to preserve in-place processing in old_crypt as various algorithms are optimised for in-place processing where src == dst. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/aead.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git

[PATCH 5/11] crypto: echainiv - Copy AD along with plain text

2015-05-27 Thread Herbert Xu
As the AD does not necessarily exist in the destination buffer it must be copied along with the plain text. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/echainiv.c | 10 ++ 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/crypto/echainiv.c

[PATCH 8/11] crypto: seqiv - Copy AD along with plain/cipher text

2015-05-27 Thread Herbert Xu
As the AD does not necessarily exist in the destination buffer it must be copied along with the plain/cipher text. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/seqiv.c | 33 ++--- 1 file changed, 6 insertions(+), 27 deletions(-) diff --git

Re: [ipsec PATCH 0/3] Preserve skb-mark through VTI tunnels

2015-05-27 Thread Steffen Klassert
On Wed, May 27, 2015 at 07:16:37AM -0700, Alexander Duyck wrote: These patches are meant to try and address the fact the VTI tunnels are currently overwriting the skb-mark value. I am generally happy with the first two patches, however the third patch still modifies the skb-mark, though it

Re: [PATCH v1 3/3] crypto: ccp - Protect against poorly marked end of sg list

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 09:12:02AM -0500, Tom Lendacky wrote: The reason I'm asking is because while this patch fixes your driver everybody else will still crash and burn should something like this happen again. A number of other drivers already have similar sg-count functions in them.

Re: [PATCH] xfrm6: Do not use xfrm_local_error for path MTU issues in tunnels

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 10:40:32AM -0700, Alexander Duyck wrote: This change makes it so that we use icmpv6_send to report PMTU issues back into tunnels in the case that the resulting packet is larger than the MTU of the outgoing interface. Previously xfrm_local_error was being used in this

Re: [PATCH RFC v2 1/2] crypto: add PKE API

2015-05-27 Thread Herbert Xu
On Sat, May 23, 2015 at 07:20:15AM -0700, Tadeusz Struk wrote: The length would be redundant. It can be obtained by sg_nents(reg-inparams) I don't limit the number of parameters. You can pass as many as you want. For instance to pass 3 in and 2 out you do: struct scatterlist in[3];

Re: [PATCH] xfrm6: Do not use xfrm_local_error for path MTU issues in tunnels

2015-05-27 Thread Steffen Klassert
On Thu, May 28, 2015 at 12:49:19PM +0800, Herbert Xu wrote: On Wed, May 27, 2015 at 10:40:32AM -0700, Alexander Duyck wrote: This change makes it so that we use icmpv6_send to report PMTU issues back into tunnels in the case that the resulting packet is larger than the MTU of the outgoing

Revert crypto: algif_aead - Disable AEAD user-space for now

2015-05-27 Thread Herbert Xu
This reverts commit f858c7bcca8c20761a20593439fe998b4b67e86b as the algif_aead interface has been switched over to the new AEAD interface. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au diff --git a/crypto/Kconfig b/crypto/Kconfig index 0ff4cd4..af011a9 100644 --- a/crypto/Kconfig +++

Re: [PATCH] crypto: jitterentropy - remove timekeeping_valid_for_hres

2015-05-27 Thread Herbert Xu
On Wed, May 27, 2015 at 01:50:12PM +0200, Stephan Mueller wrote: The patch removes the use of timekeeping_valid_for_hres which is now marked as internal for the time keeping subsystem. The jitterentropy does not really require this verification as a coarse timer (when random_get_entropy is

Re: [PATCH] xfrm6: Do not use xfrm_local_error for path MTU issues in tunnels

2015-05-27 Thread Steffen Klassert
On Wed, May 27, 2015 at 10:40:32AM -0700, Alexander Duyck wrote: This change makes it so that we use icmpv6_send to report PMTU issues back into tunnels in the case that the resulting packet is larger than the MTU of the outgoing interface. Previously xfrm_local_error was being used in this

Re: [net-next PATCH RFC 0/3] Preserve skb-mark through VTI tunnels

2015-05-27 Thread Steffen Klassert
On Tue, May 26, 2015 at 03:41:10PM -0700, Alexander Duyck wrote: These patches are meant to try and address the fact the VTI tunnels are currently overwriting the skb-mark value. I am generally happy with the first two patches, however the third patch still modifies the skb-mark, though it

Re: [net-next PATCH RFC 0/3] Preserve skb-mark through VTI tunnels

2015-05-27 Thread Herbert Xu
On Tue, May 26, 2015 at 03:41:10PM -0700, Alexander Duyck wrote: These patches are meant to try and address the fact the VTI tunnels are currently overwriting the skb-mark value. I am generally happy with the first two patches, however the third patch still modifies the skb-mark, though it

[v3 PATCH 0/8] crypto: Convert all AEAD users to new interface

2015-05-27 Thread Herbert Xu
Hi: The only changes from the last version are that set_ad no longer takes a cryptoff argument and testmgr has been updated to always supply space for the authentication tag. The algif_aead patch has been removed and will be posted separately. Series description: This series of patches convert

[v3 PATCH 7/8] mac80211: Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. Tested-by: Johannes Berg johan...@sipsolutions.net Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- net/mac80211/aes_ccm.c | 30

[v3 PATCH 5/8] esp6: Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. The IV generation is also now carried out through normal AEAD methods. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- net/ipv6/esp6.c | 200

[v3 PATCH 8/8] crypto: tcrypt - Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/tcrypt.c | 15 +++ 1 file changed, 7 insertions(+), 8 deletions(-) diff --git

[v3 PATCH 1/8] crypto: testmgr - Switch to new AEAD interface

2015-05-27 Thread Herbert Xu
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- crypto/testmgr.c | 87 ++- 1 file changed, 48

[v3 PATCH 2/8] xfrm: Add IV generator information to xfrm_algo_desc

2015-05-27 Thread Herbert Xu
This patch adds IV generator information for each AEAD and block cipher to xfrm_algo_desc. This will be used to access the new AEAD interface. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- include/net/xfrm.h |2 ++ net/xfrm/xfrm_algo.c | 16 2 files

[v3 PATCH 3/8] ipsec: Add IV generator information to xfrm_state

2015-05-27 Thread Herbert Xu
This patch adds IV generator information to xfrm_state. This is currently obtained from our own list of algorithm descriptions. Signed-off-by: Herbert Xu herb...@gondor.apana.org.au --- include/net/xfrm.h |1 + net/key/af_key.c |1 + net/xfrm/xfrm_user.c | 40