Hi,
When trying to calculate HMAC(SHA1) with openssl using af-alg engine
kernel crashes.Find below the command used and kernel. I have added
some debug print in logs.
Command used : ./openssl dgst -engine af_alg -sha1 -hmac "key" r.txt
kernel version : 3.17.8
Initial Investigation : In
Hi Stephan,
I tried 1 more patch. This time result is correct. Find attached patch
file. Is there any side effect of this patch.
Regards
Harsh Jain
On Mon, Oct 26, 2015 at 11:49 AM, Harsh Jain <harshjain.p...@gmail.com> wrote:
> Hi Stephan,
>
> I also tried test prog
d strace.Right now af_alg code is not accessible
to me. I will share it tomorrow.
Thanks and Regards
Harsh jain
On Sun, Oct 25, 2015 at 5:28 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Sonntag, 25. Oktober 2015, 11:56:27 schrieb Harsh Jain:
>
> Hi Harsh,
>
Hi Stephan,
I tried your patch on my machine. Kernel is not crashing. The openssl
break with this. Can you share HMAC program which you are suspecting
it will not work or do you already have some test written in
libkcapi/test.sh which will fail.
Regards
Harsh Jain
On Wed, Oct 28, 2015 at 6:25
uot;ctx->more" =1 after initialisation.
Correct me If I am wrong.
Thanks for your support.
regards
Harsh Jain
On Wed, Oct 28, 2015 at 4:53 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Mittwoch, 28. Oktober 2015, 16:24:34 schrieb Harsh Jain:
>
> Hi Harsh,
>
&g
Hi,
I tried patch on my setup and its working fine.
Thanks Stephan, Herbert for your support.
Regards
Harsh Jain
On Fri, Oct 30, 2015 at 4:40 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Freitag, 30. Oktober 2015, 14:02:27 schrieb Harsh Jain:
>
> Hi Harsh,
>
>&g
Hi herbert,
Which kernel versions will have this patch?
Regards
Harsh Jain
On Mon, Nov 2, 2015 at 8:42 AM, Herbert Xu <herb...@gondor.apana.org.au> wrote:
> On Sun, Nov 01, 2015 at 12:07:12PM +0100, Stephan Mueller wrote:
>> Am Sonntag, 1. November 2015, 17:11:19 schrieb Herbe
ciphertext are
sent together.
3) MAC-then-Encrypt (MtE)
A MAC is produced based on the plaintext, then the plaintext and
MAC are together encrypted to produce a ciphertext based on both. The
ciphertext (containing an encrypted MAC) is sent.
Regards
Harsh Jain
--
To unsubscribe from this list: sen
dff7fb2
-l 16f4a3eacfbdadd3b1a17117b1d67ffc1f1e21efbbc6d83724a8c296e3bb8cda0c44
It gives following error with kernel 4.5.2
Symmetric cipher setkey failed
Failed to invoke testing
Regards
Harsh Jain
On Tue, May 31, 2016 at 12:35 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Diensta
Hi,
Thanks Stephen, I will check the same.1 suggestion for kcapi tool. Add
some switch cases in tool to test digest and finup path of crypto
driver. Current implementation triggers only init/update/final.
Regards
Harsh Jain
On Tue, May 31, 2016 at 2:29 PM, Stephan Mueller <smuel...@chronox
Hi,
1) User can use libkcapi to write program for finup/digest.
2) No, kernel test for finup (not sure).
3) We can test all callback of new hash tfm drivers added in kernel.
4) My driver had issue in finup path which is not caught by kcapi test
program :)
regards
Harsh Jain
regards
Harsh Jain
).
In that way we can test all callbacks from userspace. In future if you
feel this use case important. You can add API's to implement this.
Regards
Harsh Jain
regards
Harsh Jain
regards
Harsh Jain
On Tue, May 31, 2016 at 2:51 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am D
Yes, I will share the patch.
regards
Harsh Jain
On Fri, Jun 24, 2016 at 5:31 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Freitag, 24. Juni 2016, 17:24:02 schrieb Harsh Jain:
>
> Hi Harsh,
>
>
>> 379 * The memory structure for cipher operati
* AEAD decryption output: plaintext
385 */
Regards
Harsh Jain
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi,
Thank for reply. As such I don't have any use case. But the use case I
can think of is AEAD operation on large file using AF_ALG interface.
If user tried this he/she will get invalid TAG value.
Regards
Harsh Jain
On Fri, Jul 22, 2016 at 10:10 AM, Herbert Xu
<herb...@gondor.apana.org
Hi All,
There is maximum limit of data which crypto user can send(in encrypt)
to get TAG in AEAD operations. We do not have update/final like
implementation for AEAD algo's. why is this so?
Regards
Harsh Jain
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" i
Remove redundant sg_init_table call. scatterwalk_ffwd doing the same.
Signed-off-by: Harsh Jain <harshjain.p...@gmail.com>
---
crypto/authenc.c |7 +--
1 files changed, 1 insertions(+), 6 deletions(-)
diff --git a/crypto/authenc.c b/crypto/authenc.c
index 55a354d..c7cc11d
Hi,
Why we need null skcipher to copy AAD from src to dst buffer. We can
do the same with some function,who can copy data from src sg list to
dst sg list.
Regards
Harsh Jain
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message
Kernel panics when userspace program try to access AEAD interface.
Remove node from Linked List before freeing its memory.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
crypto/algif_aead.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/algif_aead.c b/
Save DMA mapped sg list addresses to request context buffer.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_algo.c | 49 +++-
drivers/crypto/chelsio/chcr_crypto.h | 3 +++
2 files changed, 29 insertions(+), 23 deletions(-)
This patch series includes critical bug fixes
Atul Gupta (2):
crypto:chcr- Fix panic on dma_unmap_sg
crypto:chcr- Check device is allocated before use
drivers/crypto/chelsio/chcr_algo.c | 49 +++-
drivers/crypto/chelsio/chcr_core.c | 18 ++---
Ensure dev is allocated for crypto uld context before using the device
for crypto operations.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_core.c | 18 --
1 file changed, 8 insertions(+), 10 deletions(-)
diff --git
Change cipher algos flags to CRYPTO_ALG_TYPE_ABLKCIPHER.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_algo.c
Check keylen before copying salt to avoid wrap around of Integer.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_
The first argument to list_for_each_entry cannot be NULL.
Generated by: scripts/coccinelle/iterators/itnull.cocci
Signed-off-by: Julia Lawall <julia.law...@lip6.fr>
Signed-off-by: Fengguang Wu <fengguang...@intel.com>
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
driv
This patch series is based on Herbert's cryptodev-2.6 tree and depends on
patch series "Bug Fixes for 4.10". It includes Bug Fixes.
Atul Gupta (2)
crypto:chcr-Change flow IDs
crypto:chcr- Fix wrong typecasting
Harsh Jain (8):
crypto:chcr- Fix key length for RFC4106
crypt
Update priorities to 3000
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/crypto/chelsio/chcr_crypto.h
b/drivers/crypto/chelsio/chcr_crypto.h
index 7ec0a8f..81cfd0b
Initialise variable after null check.
Reported-by: Dan Carpenter <dan.carpen...@oracle.com>
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
mode change 100644 => 100755 drivers
Typecast the pointer with correct structure.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_core.c | 9 -
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_core.c
b/drivers/crypto/chelsio/chcr_core.c
index
1 Block of encrption can be done with aes-generic. no need of
cbc(aes). This patch replaces cbc(aes-generic) with aes-generic.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 20 +---
1 file changed, 9 insertions(+), 11 deletions(-)
Change assign flowc id to each outgoing request.Firmware use flowc id
to schedule each request onto HW. FW reply may miss without this change.
Reviewed-by: Hariprasad Shenai
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_algo.c
rypto test executions). If I execute same
test again issue didn't reproduce.
Regards
Harsh Jain
to dest. buffer.
http://www.chronox.de/libkcapi/html/ch02s02.html
Secondly When AAD data remains unchanged in AEAD encryption/decryption
operations. Why we copy the same data to destination buffer?
Thanks & Regards
Harsh Jain
--
To unsubscribe from this list: send the line "unsubscribe lin
Hi,
What is the expected behavior when driver is unregistered(Rmmod ) with
active ipsec session.?
I am getting stacktrace(BUG_ON in crypto_unregister_alg) instead of
"module in use".
Regards
Harsh Jain
--
To unsubscribe from this list: send the line "unsubscribe linux-cryp
On 14-10-2016 19:54, Stephan Mueller wrote:
> Am Donnerstag, 13. Oktober 2016, 16:39:39 CEST schrieb Harsh Jain:
>
> Hi Harsh,
>
>> Add support for following AEAD algos.
>> GCM,CCM,RFC4106,RFC4309,authenc(hmac(shaXXX),cbc(aes)).
>>
>> Signed-o
On 08-11-2016 18:29, Stephan Mueller wrote:
> Am Dienstag, 8. November 2016, 17:16:38 CET schrieb Harsh Jain:
>
> Hi Harsh,
>
>> On 08-11-2016 16:45, Stephan Mueller wrote:
>>> Am Donnerstag, 27. Oktober 2016, 15:36:08 CET schrieb Harsh Jain:
>>>
&
On 08-11-2016 19:51, Harsh Jain wrote:
>
> On 08-11-2016 18:29, Stephan Mueller wrote:
>> Am Dienstag, 8. November 2016, 17:16:38 CET schrieb Harsh Jain:
>>
>> Hi Harsh,
>>
>>> On 08-11-2016 16:45, Stephan Mueller wrote:
>>>> Am Donnerstag
On 08-11-2016 16:45, Stephan Mueller wrote:
> Am Donnerstag, 27. Oktober 2016, 15:36:08 CET schrieb Harsh Jain:
>
> Hi Harsh,
>
>>>> +static void chcr_verify_tag(struct aead_request *req, u8 *input, int
>>>> *err)
>>>> +{
>>>> +
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 239 +--
drivers/crypto/chelsio/chcr_algo.h | 28 ++--
drivers/crypto/chelsio/chcr_core.h | 16 +++
drivers/crypto/chelsio/chcr_crypto.h | 6 -
4 files changed,
Fix memory corruption done by *((u32 *)dec_key + k) operation.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 52 ++
drivers/crypto/chelsio/chcr_algo.h | 58 +-
2 files changed, 53
, Unchecked dereference inside function.
Remove malloc/free in hash operation and allocate memory in
chcr_ahash_req_ctx structure.
Harsh Jain (5):
Calculate Reverse round key in setkey callback.
chcr: Adjust Dest. buffer size
chcr: Use SHASH_DESC_ON_STACK
chcr: Move tfm ctx variable
Add support for following AEAD algos.
GCM,CCM,RFC4106,RFC4309,authenc(hmac(shaXXX),cbc(aes)).
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/Kconfig |1 +
drivers/crypto/chelsio/chcr_algo.c | 1482 +-
drivers/crypto/c
Move request specific data in request context.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 26 +-
drivers/crypto/chelsio/chcr_crypto.h | 9 -
2 files changed, 17 insertions(+), 18 deletions(-)
diff --git a/d
Move reverse round key calculation logic in setkey operation.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 52
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
2 files changed, 24 insertions(+), 30 deletions(-)
Use SHASH_DESC_ON_STACK macro to allocate memory for ipad/opad
calculation.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 63 +++-
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
2 files changed, 27 insertions(
Fixes 324429d74127, Unchecked dereference inside function.
Reported-by: Dan Carpenter
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
Destination buffer size passed to hardware should not be greater
than crypto operation output.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 50 +++---
1 file changed, 20 insertions(+), 30 deletions(-)
diff --git a/d
Remove malloc/free in hash operation and allocate
memory in chcr_ahash_req_ctx structure.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 69 +---
drivers/crypto/chelsio/chcr_crypto.h | 8 +++--
2 files changed, 45
On 21-10-2016 07:50, Herbert Xu wrote:
> On Thu, Oct 13, 2016 at 04:39:35PM +0530, Harsh Jain wrote:
>> Remove malloc/free in crypto operation and allocate memory via cra_ctxsize.
>> Added new structure chcr_wr to populate Work Request Header.
>> Fixes: 324429d74127 (chcr:
Destination buffer size passed to hardware should not be greater
than crypto operation output.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 50 +++---
1 file changed, 20 insertions(+), 30 deletions(-)
diff --git
Add support for following AEAD algos.
GCM,CCM,RFC4106,RFC4309,authenc(hmac(shaXXX),cbc(aes)).
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/Kconfig |1 +
drivers/crypto/chelsio/chcr_algo.c | 1466 +-
drivers/crypto/c
Move tfm ctx variable to request context.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 26 +-
drivers/crypto/chelsio/chcr_crypto.h | 9 -
2 files changed, 17 insertions(+), 18 deletions(-)
diff --git a/drivers/
Use SHASH_DESC_ON_STACK macro to allocate memory for ipad/opad
calculation.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 63 +++-
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
2 files changed, 27 insertions(
Remove malloc/free in crypto operation and allocate memory via cra_ctxsize.
Added new structure chcr_wr to populate Work Request Header.
Fixes: 324429d74127 (chcr: Support for Chelsio's Crypto Hardware)
Reported-by: Dan Carpenter
Signed-off-by: Jitendra Lulla
ion buffer size passed to hardware should not be greater than
crypto operation output.
Harsh Jain (3):
Use SHASH_DESC_ON_STACK macro to allocate memory for ipad/opad
calculation.
Move tfm ctx variable to request context.
Add support for AEAD algos
GCM,CCM,RFC4106,RFC4303,authenc(h
Fix memory corruption done by *((u32 *)dec_key + k) operation.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 52 ++
drivers/crypto/chelsio/chcr_algo.h | 58 +-
2 files changed, 53
On 12-01-2017 21:39, Herbert Xu wrote:
> On Fri, Jan 06, 2017 at 02:01:34PM +0530, Harsh Jain wrote:
>> Check keylen before copying salt to avoid wrap around of Integer.
>>
>> Signed-off-by: Harsh Jain <ha...@chelsio.com>
>> ---
>> drivers/crypto/chelsio/
Ensure dev is allocated for crypto uld context before using the device
for crypto operations.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_core.c | 18 --
1 file changed, 8 insertions(+), 10 deletions(-)
diff --git
Save DMA mapped sg list addresses to request context buffer.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_algo.c | 49 +++-
drivers/crypto/chelsio/chcr_crypto.h | 3 +++
2 files changed, 29 insertions(+), 23 deletions(-)
This patch series is based on Herbert's cryptodev-2.6 tree.
It includes several critical bug fixes.
Atul Gupta (3):
crypto:chcr-Change flow IDs
crypto:chcr- Fix panic on dma_unmap_sg
crypto:chcr- Check device is allocated before use
Julia Lawall (1):
crypto:chcr-fix itnull.cocci warnings
Change assign flowc id to each outgoing request.Firmware use flowc id
to schedule each request onto HW. FW reply may lost without this change.
Reviewed-by: Hariprasad Shenai
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_algo.c
The first argument to list_for_each_entry cannot be NULL.
Generated by: scripts/coccinelle/iterators/itnull.cocci
Signed-off-by: Julia Lawall <julia.law...@lip6.fr>
Signed-off-by: Fengguang Wu <fengguang...@intel.com>
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
driv
Remove malloc/free in hash operation and allocate
memory in chcr_ahash_req_ctx structure.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 69 +---
drivers/crypto/chelsio/chcr_crypto.h | 8 +++--
2 files changed, 45
Fixes 324429d74127, Unchecked dereference inside function.
Reported-by: Dan Carpenter
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
Add support for following AEAD algos.
GCM,CCM,RFC4106,RFC4309,authenc(hmac(shaXXX),cbc(aes)).
Reviewed-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/Kconfig |1 +
drivers/crypto/chelsio/chcr_alg
Added new structure chcr_wr to populate Work Request Header.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 239 +--
drivers/crypto/chelsio/chcr_algo.h | 28 ++--
drivers/crypto/chelsio/chcr_core.h | 16 +++
Moves get_aes_decrypt_key function to .c file and declare inline for
"aes_ks_subword"
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.c | 52 +
drivers/crypto/chelsio/chcr_algo.h | 59 +-
structure chcr_wr to populate Work Request
Header.
crypto/chcr: Fixes Unchecked dereference inside function
crypto/chcr: Remove dynamic allocation
Harsh Jain (5):
crypto/chcr: Calculate Reverse round key in setkey callback.
crypto/chcr: Adjust Dest. buffer size
crypto/chcr: Use SHASH_DES
Destination buffer size passed to hardware should not be greater
than crypto operation output.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 50 +++---
1 file changed, 20 insertions(+), 30 deletions(-)
diff --git a/d
Move request specific data in request context.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 26 +-
drivers/crypto/chelsio/chcr_crypto.h | 9 -
2 files changed, 17 insertions(+), 18 deletions(-)
diff --git a/d
Move reverse round key calculation logic in setkey operation.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 52
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
2 files changed, 24 insertions(+), 30 deletions(-)
Fix memory corruption done by *((u32 *)dec_key + k)
operation.
Signed-off-by: Jitendra Lulla
---
drivers/crypto/chelsio/chcr_algo.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.h
Use SHASH_DESC_ON_STACK macro to allocate memory for ipad/opad
calculation.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 63 +++-
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
2 files changed, 27 insertions(
On 02-12-2016 11:29, Harsh Jain wrote:
>
> On 02-12-2016 02:19, Dan Carpenter wrote:
>> The create_hash_wr() function never returns error pointers. It returns
>> NULL on error.
> Will fix the same, Thanks
It's a patch mail not bug reporting! Sorry for confusion. Yo
On 02-12-2016 02:19, Dan Carpenter wrote:
> The create_hash_wr() function never returns error pointers. It returns
> NULL on error.
Will fix the same, Thanks
>
> Fixes: 358961d1cd1e ("crypto: chcr - Added new structure chcr_wr")
> Signed-off-by: Dan Carpenter
>
> diff
1 Block of encrption can be done with aes-generic. no need of
cbc(aes). This patch replaces cbc(aes-generic) with aes-generic.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 20 +---
1 file changed, 9 insertions(+), 11 deletions(-)
Ensure dev is allocated for crypto uld context before using the device
for crypto operations.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_core.c | 18 --
1 file changed, 8 insertions(+), 10 deletions(-)
diff --git
Change cipher algos flags to CRYPTO_ALG_TYPE_ABLKCIPHER.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_algo.c
The patch series is based on Herbert's cryptodev-2.6 tree.
It include bug fixes.
Atul Gupta (4):
crypto:chcr-Change flow IDs
crypto:chcr- Fix panic on dma_unmap_sg
crypto:chcr- Check device is allocated before use
crypto:chcr- Fix wrong typecasting
Harsh Jain (4):
crypto:chcr- Fix key
Check keylen before copying salt to avoid wrap around of Integer.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_
Save DMA mapped sg list addresses to request context buffer.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_algo.c | 49 +++-
drivers/crypto/chelsio/chcr_crypto.h | 3 +++
2 files changed, 29 insertions(+), 23 deletions(-)
Typecast the pointer with correct structure.
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chcr_core.c | 9 -
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_core.c
b/drivers/crypto/chelsio/chcr_core.c
index
On 21-12-2016 14:24, Herbert Xu wrote:
> On Mon, Dec 19, 2016 at 04:08:11PM +0530, Harsh Jain wrote:
>> Hi Herbert,
>>
>> TLS default mode of operation is MAC-then-Encrypt for Authenc algos.
>> Currently framework only supports EtM used in IPSec. User space
>> pr
releases?
Regards
Harsh Jain
On Tue, May 31, 2016 at 12:35 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Dienstag, 31. Mai 2016, 12:31:16 schrieb Harsh Jain:
>
> Hi Harsh,
>
>> Hi All,
>>
>> How can we open socket of type "authenc(hmac(sha256),cbc
20ee6b7 -k
f4a6a5e5f2066f6dd9ec6fc5169c29043560ef595c9e81e76f42d29212cc581c -a ""
-t "5f24c68cbe6f32c29652442bf5d483ad" -q ""
Its decrypt operation. Expected result should be EBADMSG.
Regards
Harsh Jain
On Tue, Mar 21, 2017 at 5:13 PM, Stephan Müller <smuel...@chronox.de> wrote:
> Am Dienstag, 21. März 2017, 11:59:54 CET schrieb Harsh Jain:
>
> Hi Harsh,
>
>> > Executing this command on a 4.9 kernel, I get:
>> >
>> > bin/kcapi -x 2
On Tue, Mar 21, 2017 at 3:34 PM, Stephan Müller <smuel...@chronox.de> wrote:
> Am Dienstag, 21. März 2017, 07:13:53 CET schrieb Harsh Jain:
>
> Hi Harsh,
>
>> Hi,
>>
>> For tag only AEAD decrypt operation(Zero length Payload). The dst sg
>> list pointer pa
On Tue, Mar 21, 2017 at 4:29 PM, Harsh Jain <harshjain.p...@gmail.com> wrote:
> On Tue, Mar 21, 2017 at 3:34 PM, Stephan Müller <smuel...@chronox.de> wrote:
>> Am Dienstag, 21. März 2017, 07:13:53 CET schrieb Harsh Jain:
>>
>> Hi Harsh,
>>
>>> Hi,
On Tue, Apr 4, 2017 at 6:07 PM, Stephan Müller <smuel...@chronox.de> wrote:
> Am Dienstag, 4. April 2017, 09:53:17 CEST schrieb Harsh Jain:
>
> Hi Harsh,
>
>> Hi,
>>
>> Do we have any guidelines documented to decide what should be the
>>
Use hmac_ctrl bit value saved in setauthsize callback.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 24 +---
1 files changed, 5 insertions(+), 19 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/
-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 12 ++--
drivers/crypto/chelsio/chcr_crypto.h |4 ++--
2 files changed, 12 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypto/chelsio/chcr_algo.c
index 4
This series based on Herbert cryptodev-2.6.
It includes bug fixes and fallback for AEAD algos.
Harsh Jain (3):
chcr: Increase priority of AEAD algos.
chcr:Set hmac_ctrl bit to use HW register HMAC_CFG[456].
chcr: Add fallback for AEAD algos
Atul Gupta (1):
chcr: Fix txq ids
drivers
Fallback to sw when
I AAD length greater than 511
II Zero length payload
II No of sg entries exceeds Request size.
Signed-off-by: Harsh Jain <ha...@chelsio.com>
---
drivers/crypto/chelsio/chcr_algo.c | 219 ++
drivers/crypto/chelsio/chcr_
The patch fixes a critical issue to map txqid with flows on the hardware
appropriately,
if tx queues created are more than flows configured then txqid shall map within
the range of hardware flows configured. This ensure that un-mapped txqid does
not remain un-handled.
The patch also segregated
On Fri, Apr 14, 2017 at 3:35 AM, Logan Gunthorpe wrote:
> The get_page in this area looks *highly* suspect due to there being no
> corresponding put_page. However, I've left that as is to avoid breaking
> things.
chcr driver will post the request to LLD driver cxgb4 and
On Thu, Apr 13, 2017 at 8:20 PM, Christophe JAILLET
wrote:
> Le 13/04/2017 à 16:04, Dan Carpenter a écrit :
>>
>> On Thu, Apr 13, 2017 at 02:14:30PM +0200, Christophe JAILLET wrote:
>>>
>>> If 'chcr_alloc_shash()' a few lines above fails, 'base_hash' can be an
>>>
Hi Herbert
On Fri, Jan 27, 2017 at 4:09 PM, Harsh Jain <ha...@chelsio.com> wrote:
> Change cipher algos flags to CRYPTO_ALG_TYPE_ABLKCIPHER.
>
> Signed-off-by: Harsh Jain <ha...@chelsio.com>
> ---
> drivers/crypto/chelsio/chcr_algo.c | 6 +++---
> 1 file changed
On 20-07-2017 16:02, Dan Carpenter wrote:
> Hello Harsh Jain,
>
> The patch 14c19b178a01: "crypto: chcr - Select device in Round Robin
> fashion" from Jun 15, 2017, leads to the following static checker
> warning:
>
> drivers/crypto/chelsio/chcr_core.c:
s't a BUG? or I missed something.
Regards
Harsh Jain
On Wed, Jun 7, 2017 at 7:27 PM, Che-Min Hsieh wrote:
> Rfc4309 test vectors in testmgr.h have gone through major changes from linux3
> to linux4.
> In linux 4.4, linux4.9, there are vectors as such
>
> 23194 static struct aead_testvec aes_ccm_rfc4309_enc_tv_template[]
1 - 100 of 186 matches
Mail list logo