Access to global talitos registers must be protected for the case when
affinities are configured such that primary and secondary talitos irqs
run on different cpus.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Signed-off-by: Kim Phillips kim.phill...@freescale.com
---
drivers/crypto
adding the netdev folks to comment, advise.
Thanks,
Horia
From 30f6247fa5ada7e53523492ca4e70b61e3f5aeeb Mon Sep 17 00:00:00 2001
From: Horia Geanta horia.gea...@freescale.com
Date: Wed, 2 May 2012 18:40:03 +0300
Subject: [RFC/PATCH] crypto: talitos - replace the tasklet implementation with
NAPI
With this, now all combinations of
CBC: AES, 3DES-EDE
with
HMAC: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
are supported.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 161 +-
drivers/crypto/talitos.h |6
This patch exports the talitos_submit function so that on
need basis same can be used by other entities.
Signed-off-by: Sandeep Malik sandeep.ma...@freescale.com
Signed-off-by: Kim Phillips kim.phill...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto
This patch moves the talitos structure definitions from c file to its
header file so that the same can be shared on need basis.
Signed-off-by: Sandeep Malik sandeep.ma...@freescale.com
Signed-off-by: Kim Phillips kim.phill...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Test vectors were generated starting from existing CBC(AES) test vectors
(RFC3602, NIST SP800-38A) and adding HMAC(SHA*) computed with Crypto++ and
double-checked with HashCalc.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/testmgr.c | 36 +++
crypto/testmgr.h | 834
.)
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/testmgr.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index ee62d5c..af2a1a3 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -374,7 +374,7 @@ static int
talitos_edesc_alloc does not need hash_result param.
Checking whether dst scatterlist is NULL or not is all that is required.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 13 ++---
1 files changed, 6 insertions(+), 7 deletions(-)
diff --git
It's more natural to think of these vars as bool rather than int.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 41 -
1 files changed, 20 insertions(+), 21 deletions(-)
diff --git a/drivers/crypto/talitos.c b
the condition
edesc-dma_len 0 must be more specific, i.e. must depend on the type
of the output buffer - fragmented or not.
Testing was performed by modifying testmgr to support src != dst,
since currently native kernel IPsec does in-place encryption
(src == dst).
Signed-off-by: Horia Geanta horia.gea
Generate a link table in case assoc data is a scatterlist.
While at it, add support for handling non-contiguous assoc data and iv.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 176 -
1 files changed, 125
Suuport for ESNs (extended sequence numbers).
Tested with strongswan on a P2020RDB back-to-back setup.
From /etc/ipsec.conf:
esp=aes-sha1-esn-modp4096!
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 318 ++
1
Support for ESNs (extended sequence numbers).
Tested with strongswan on a P2020RDB back-to-back setup.
Extracted from /etc/ipsec.conf:
esp=aes-sha1-esn-modp4096!
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 30 --
1 files
Support for ESNs (extended sequence numbers).
Tested with strongswan by connecting back-to-back P1010RDB with P2020RDB.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 27 +--
drivers/crypto/caam/compat.h |1 +
2 files
According to SEC v5.0-v5.3 reference manuals.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Acked-by: Kim Phillips kim.phill...@freescale.com
---
drivers/crypto/caam/error.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/caam/error.c b/drivers
On 9/17/2012 10:33 AM, Vakul Garg wrote:
On P5040, SEC-ERA does not print correctly. This is because SEC-VID to SEC-ERA
mapping table does not contain information for P5040. This patch adds this
information.
Signed-off-by: Vakul Garg va...@freescale.com
---
Please update the patch with the
the condition
edesc-dma_len 0 must be more specific, i.e. must depend on the type
of the output buffer - fragmented or not.
Testing was performed by modifying testmgr to support src != dst,
since currently native kernel IPsec does in-place encryption
(src == dst).
Signed-off-by: Horia Geanta horia.gea
Generate a link table in case assoc data is a scatterlist.
While at it, add support for handling non-contiguous assoc data and iv.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 177 -
1 files changed, 126
.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 21 -
1 files changed, 16 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c
index 9975718..3ebc1bf 100644
--- a/drivers/crypto/talitos.c
+++ b
crash with zero-length assoc data
from crypto tree fixes for native crypto.
(http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg07662.html)
AFAICT, patches apply cleanly both on crypto and 3.6-rc6 ToT.
Thanks,
Horia
Horia Geanta (3):
crypto: talitos - fix icv management on outbound
On 9/27/2012 8:25 AM, Herbert Xu wrote:
On Wed, Sep 19, 2012 at 09:53:37PM +0300, Horia Geanta wrote:
Hi Herbert,
I know these patches come late and might not be included in 3.6.
But two of them are already sitting in cryptodev tree for some time.
(Don't know where my head was :/).
I'm
On 9/27/2012 11:14 AM, Herbert Xu wrote:
On Thu, Sep 27, 2012 at 11:01:50AM +0300, Horia Geanta wrote:
Again, this patch (e46e9a) is not the culprit, it merely exposes the
deficiencies in the talitos driver.
AFAICT, these cases (zero assoc data, noncontiguous iv and assoc
data) have never been
the sequence
SPI, SeqNum-High, SeqNum-Low, IV, Payload
instead of
SPI, SeqNum-Low, IV, Payload, SeqNum-High.
Cc: sta...@vger.kernel.org # 3.8, 3.7
Reported-by: Chaoxing Lin chaoxing@ultra-3eti.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 30
instead of
SPI, SeqNum-Low, IV, Payload, SeqNum-High.
Cc: sta...@vger.kernel.org # 3.8, 3.7
Reported-by: Chaoxing Lin chaoxing@ultra-3eti.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 27 ++-
drivers/crypto/caam/compat.h
req-assoc is dma mapped BIDIRECTIONAL and unmapped TO_DEVICE.
Since it is read-only for the device, use TO_DEVICE both for mapping
and unmapping.
Cc: sta...@vger.kernel.org # 3.9, 3.8
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c |4 ++--
1 files
,
leading to an oops when trying to return desc-hdr (desc is zero)
-read channel's .tail only once; the tail is a moving target; use a
local variable for the end of search condition
Signed-off-by: Lei Xu lei...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Tested-by: Kalyani
.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
This patch was submitted late in the 3.6 cycle, but has not
showed up - neither in 3.6 nor in 3.7. Please apply.
drivers/crypto/talitos.c | 21 -
1 files changed, 16 insertions(+), 5 deletions(-)
diff --git a/drivers
80e90004 38630001 8109000c 70ea0002
---[ end trace 4498123cd8478591 ]---
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
Please apply the following first (sent 11/19/2013):
crypto: talitos - corrrectly handle zero-length assoc data
https://www.mail-archive.com/linux-crypto@vger.kernel.org
encryption / decryption adds / removes
the ICV.
Cc: Jussi Kivilinna jussi.kivili...@mbnet.fi
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/testmgr.c | 26 --
1 files changed, 12 insertions(+), 14 deletions(-)
diff --git a/crypto/testmgr.c b/crypto
Use the common helper function crypto_authenc_extractkeys() for key
parsing.
Also fix the key buffer overflow condition: use split key pad length
instead of authentication key length.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 36
Add support for the following combinations:
-encryption: null
-authentication: md5, sha* (1, 224, 256, 384, 512)
Signed-off-by: Tudor Ambarus tudor.amba...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 327
These defines might be needed by crypto drivers.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/crypto_null.c | 6 +-
include/crypto/null.h | 11 +++
2 files changed, 12 insertions(+), 5 deletions(-)
create mode 100644 include/crypto/null.h
diff --git a/crypto
no
meaning for SHARE_SERIAL.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 54 ++-
1 file changed, 7 insertions(+), 47 deletions(-)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c
index
Add test vectors for aead with null encryption and md5,
respectively sha1 authentication.
Input data is taken from test vectors listed in RFC2410.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/tcrypt.c | 8 +++
crypto/testmgr.c | 32 ++
crypto/testmgr.h | 180
(struct caam_ctx) ctx-key_dma needs to be unmapped
when context is cleaned up.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c
index
In case hash key is bigger than algorithm block size, it is hashed.
In this case, memory is allocated to keep this hash in hashed_key.
hashed_key has to be freed on the key_dma dma mapping error path.
Cc: sta...@vger.kernel.org # 3.10+
Signed-off-by: Horia Geanta horia.gea...@freescale.com
GFP_ATOMIC memory allocation could fail.
In this case, avoid NULL pointer dereference and notify user.
Cc: sta...@vger.kernel.org # 3.2+
Cc: Kim Phillips kim.phill...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/error.c | 10 +++---
1 file
,
Horia
Horia Geanta (10):
crypto: testmgr - avoid DMA mapping from text, rodata, stack
crypto: caam - set coherent_dma_mask
crypto: caam - fix typo in dma_mapping_error
crypto: caam - fix failed to check map error DMA warnings
crypto: caam - fix DMA unmapping error in hash_digest_key
] ret_from_kernel_thread+0x5c/0x64
Instruction dump:
41de01c8 80a9002c 2f85 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
3863f4a4 813a0020 815a0024 4830cd01 0fe0 81340048 2f89 40feff48
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamhash.c | 1 +
1 file changed, 1
] test_hash+0x28/0xb0
[c0230458] alg_test_hash+0x48/0xc0
[c022fa94] alg_test+0x114/0x2e0
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamhash.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto
] ret_from_kernel_thread+0x5c/0x64
Instruction dump:
41de01c8 80a9002c 2f85 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
3863f4a4 813a0020 815a0024 4830cd01 0fe0 81340048 2f89 40feff48
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamhash.c | 2 ++
1 file changed, 2
at:
[f96251bc] ahash_final_ctx+0x14c/0x7b0 [caamhash]
[c022ff4c] __test_hash+0x2ac/0x6c0
[c0230388] test_hash+0x28/0xb0
[c02304a4] alg_test_hash+0x94/0xc0
[c022fa94] alg_test+0x114/0x2e0
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamhash.c | 2 +-
1 file
Replace dma_set_mask with dma_set_mask_and_coherent, since both
streaming and coherent DMA mappings are being used.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/ctrl.c | 6 +++---
drivers/crypto/caam/jr.c | 6 +++---
2 files changed, 6 insertions(+), 6
at:
[f9352454] ahash_update_first+0x5b4/0xba0 [caamhash]
[c022ff28] __test_hash+0x288/0x6c0
[c0230388] test_hash+0x28/0xb0
[c02304a4] alg_test_hash+0x94/0xc0
[c022fa94] alg_test+0x114/0x2e0
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamhash.c | 2 +-
1 file
Use dma_mapping_error for every dma_map_single / dma_map_page.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 34 +++--
drivers/crypto/caam/caamhash.c | 106 ++---
drivers/crypto/caam/caamrng.c | 51
dma_mapping_error checks for an incorrect DMA address:
s/ctx-sh_desc_enc_dma/ctx-sh_desc_dec_dma
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers
With DMA_API_DEBUG set, following warnings are emitted
(tested on CAAM accelerator):
DMA-API: device driver maps memory from kernel text or rodata
DMA-API: device driver maps memory from stack
and the culprits are:
-key in __test_aead and __test_hash
-result in __test_hash
Signed-off-by: Horia
] [c00497a4] kthread+0xc4/0xe0
[eebd1f40] [c000f2fc] ret_from_kernel_thread+0x5c/0x64
Instruction dump:
41de01c8 80a9002c 2f85 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
3863f4a4 813a0020 815a0024 4830cd01 0fe0 81340048 2f89 40feff48
Signed-off-by: Horia Geanta horia.gea
sec4_sg_entry structure is used only by helper functions in sg_sw_sec4.h.
Since SEC HW S/G entries are to be manipulated only indirectly, via these
functions, move sec4_sg_entry to the corresponding header.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/desc.h
array size is 16,
the condition err_id ARRAY_SIZE(err_id_list) is always true.
3. remove unused / unneeded variables
4. remove precision loss warning - offset field in HW s/g table
5. replace offsetof with container_of
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto
RSR (Request Source Register) is not used when
virtualization is disabled, thus don't poll for Valid bit.
Besides this, if used, timeout has to be reinitialized.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
Only compile-tested.
Ruchika / Kim, please review / test.
drivers/crypto
to accommodate maximum key length from
existing test vectors in crypto/testmgr.h (131 bytes) and rounded.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
v2: Addressed Kim's comments.
crypto/testmgr.c | 57
crypto/testmgr.h | 2
files.
Patch 12 adds support for generating kernel-doc for RTA.
It depends on upstream (torvalds/linux.git) commit
cbb4d3e6510b99522719c5ef0cd0482886a324c0
(scripts/kernel-doc: handle object-like macros)
Thanks,
Horia
Horia Geanta (12):
crypto: caam - completely remove error propagation handling
array size is 16,
the condition err_id ARRAY_SIZE(err_id_list) is always true.
3. remove unused / unneeded variables
4. remove precision loss warning - offset field in HW s/g table
5. replace offsetof with container_of
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto
arithmetic source mask
5. rename LDST_SRCDST_WORD_CLASS1_ICV_SZ to
LDST_SRCDST_WORD_CLASS1_IV_SZ (it refers to IV, not ICV).
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/desc.h | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git
defining the API
-part 3 - replace desc.h with a newer version (from within library)
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Signed-off-by: Carmen Iorga carmen.io...@freescale.com
---
drivers/crypto/caam/flib/rta/fifo_load_store_cmd.h | 303
drivers/crypto/caam/flib/rta
IPAD | OPAD HMAC keys encrypted with JDKEK (Job Descriptor
Key-Encryption Key); JDKEK changes at device POR.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 668 +
drivers/crypto/caam/caamhash.c | 389
desc_constr.h no longer has users, being replaced by RTA,
so get rid of it.
pdb.h is removed since its structures are not currently used.
Future protocol descriptors will add these when needed
in flib/desc/ directory.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto
Add headers defining the RTA API.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
Signed-off-by: Carmen Iorga carmen.io...@freescale.com
---
drivers/crypto/caam/flib/rta.h | 980
drivers/crypto/caam/flib/rta/protocol_cmd.h | 595
Refactor descriptor creation in caamalg and caamhash, i.e.
create whole descriptors in the same place / function.
This makes the code more comprehensible and easier to maintain.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 244
90010024 8123 552917be 1d290320 7d295214
---[ end trace ff191e5b504b4671 ]---
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
This might affect other drivers, haven't checked.
There might be other cases failing too.
Please carrefuly review side effects of commit 5be4d4c94b1f.
crypto
talitos_edesc and talitos_request structures are moved to crypto
request private context.
This avoids allocating memory in the driver in the cases when data
(assoc, in, out) is not scattered.
It is also an intermediary step towards adding backlogging support.
Signed-off-by: Horia Geanta
Some crypto backends might require the requests' private contexts
to be allocated in DMA-able memory.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
Depends on patch 1/4 (sent only on crypto list) that adds the
CRYPTO_TFM_REQ_DMA flag.
net/ipv4/esp4.c | 7 ++-
net/ipv6/esp6.c
talitos_edesc and talitos_request structures are moved to crypto
request private context.
This avoids allocating memory in the driver in the cases when data
(assoc, in, out) is not scattered.
It is also an intermediary step towards adding backlogging support.
Signed-off-by: Horia Geanta
The CRYPTO_TFM_REQ_DMA flag can be used by backend implementations to
indicate to crypto API the need to allocate GFP_DMA memory
for private contexts of the crypto requests.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
include/linux/crypto.h | 9 +
1 file changed, 9
The CRYPTO_TFM_REQ_DMA flag can be used by backend implementations to
indicate to crypto API the need to allocate GFP_DMA memory
for private contexts of the crypto requests.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
include/crypto/hash.h | 4
include/linux/crypto.h | 9
is returned. The queued
requests are dispatched to the hardware in received order as hardware FIFO
slots become available.
Signed-off-by: Martin Hicks m...@bork.org
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 107
is returned. The queued
requests are dispatched to the hardware in received order as hardware FIFO
slots become available.
Signed-off-by: Martin Hicks m...@bork.org
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/talitos.c | 107
Some crypto backends might require the requests' private contexts
to be allocated in DMA-able memory.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
Depends on patch 1/4 (sent only on crypto list) that adds the
CRYPTO_TFM_REQ_DMA flag.
net/ipv4/esp4.c | 7 ++-
net/ipv6/esp6.c
On 8/7/2018 11:00 AM, Marcin Niestroj wrote:
> It is possible, that caam_jr_alloc() is called before JR devices are
> probed. Return -EPROBE_DEFER in drivers that rely on JR devices, so
> they are probed at later stage.
>
These drivers don't have a probe() callback.
Returning -EPROBE_DEFER in
On 9/15/2016 5:37 PM, SF Markus Elfring wrote:
> From: Markus Elfring
> Date: Thu, 15 Sep 2016 16:27:23 +0200
>
> Some update suggestions were taken into account
> from static source code analysis.
>
> Markus Elfring (6):
> Use kmalloc_array() in ahash_setkey()
On 10/4/2016 10:33 AM, Marcus Folkesson wrote:
> i.MX6UL does only require three clocks to enable CAAM module.
>
> Signed-off-by: Marcus Folkesson
Reviewed-by: Horia Geantă
Thanks,
Horia
--
To unsubscribe from this list: send the line
On 9/22/2016 1:58 PM, Catalin Vasile wrote:
> Signed-off-by: Catalin Vasile
Reviewed-by: Horia Geantă
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info
On 9/22/2016 2:42 PM, Horia Geanta Neag wrote:
> On 9/22/2016 1:58 PM, Catalin Vasile wrote:
>> Signed-off-by: Catalin Vasile <cata.vas...@nxp.com>
> Reviewed-by: Horia Geantă <horia.gea...@nxp.com>
Actually please fix also the warning reported by kbuild test robot in
On 9/22/2016 11:58 AM, Catalin Vasile wrote:
> Ensure scatterlists have a virtual memory mapping before dumping.
>
> Signed-off-by: Catalin Vasile
> ---
> Changes:
> V2:
> * resolved issue of sleeping in atomic contexts
> ---
> ---
>
On 9/22/2016 1:55 PM, Herbert Xu wrote:
> Horia Geanta Neag <horia.gea...@nxp.com> wrote:
>>
>>> +
>>> +static void dbg_dump_sg(const char *level, const char *prefix_str,
>>> + int prefix_type, int rowsize, int groupsize,
>>&
On 9/16/2016 12:06 PM, Catalin Vasile wrote:
> Ensure scatterlists have a virtual memory mapping before dumping.
>
> Signed-off-by: Catalin Vasile
> ---
> drivers/crypto/caam/caamalg.c | 65
> +--
> 1 file changed, 50 insertions(+),
On 2/26/2013 7:11 PM, Zeev Zilberman wrote:
> Hi,
>
> I'm working on an ahash driver that supports CRC32C.
> I saw that all existing CRC32C implementations (except blackfin) are
> implementing shash interface, but ahash seems to be the correct choice
> in our case.
> On the other hand I saw that
On 11/5/2016 1:17 AM, Sven Ebenfeld wrote:
> When using AES-XTS on a Wandboard, we receive a Mode error:
> caam_jr 2102000.jr1: 20001311: CCB: desc idx 19: AES: Mode error.
>
> Due to the Security Reference Manual, the Low Power AES units
s/Due to/According to
> of the i.MX6 do not support the
On 10/26/2016 12:29 AM, Arnd Bergmann wrote:
> Building the caam driver on arm64 produces a harmless warning:
>
> drivers/crypto/caam/caamalg.c:140:139: warning: comparison of distinct
> pointer types lacks a cast
>
> We can use min_t to tell the compiler which type we want it to use
> here.
>
On 10/25/2016 12:33 AM, Fabio Estevam wrote:
> On Mon, Oct 24, 2016 at 6:39 PM, Marek Vasut wrote:
>
>> Can't you rather fix it?
>
> I would love to have this fixed, but I don't know how.
Looking on the i.MX6 Solo Lite security manual, the fix seems to consist
in enabling
81 matches
Mail list logo