Hi,
On Thu, Oct 29, 2020 at 12:05 PM Gilad Ben-Yossef wrote:
>
>
> This series creates an EBOIV template that produces a skcipher
> transform which passes through all operations to the skcipher, while
> using the same skcipher and key to encrypt the input IV, which is
> assu
Hi,
On Fri, Oct 30, 2020 at 12:33 PM Milan Broz wrote:
>
> On 29/10/2020 11:05, Gilad Ben-Yossef wrote:
> >
> > +config CRYPTO_EBOIV
> > + tristate "EBOIV support for block encryption"
> > + default DM_CRYPT
> > + select CRYPTO_CBC
&g
Add test vectors for the use of the EBOIV template with cbc(aes)
modes as it is being used by dm-crypt for BitLocker support.
Vectors taken from dm-crypt test suite images.
Signed-off-by: Gilad Ben-Yossef
---
crypto/tcrypt.c | 9 ++
crypto/testmgr.c | 6 +
crypto/testmgr.h | 279
BitLocker eboiv support, which was removed in
commit 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
is reintroduced based on the crypto API new support for
eboiv.
Signed-off-by: Gilad Ben-Yossef
Fixes: 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
---
-crypt test suite and on an arm 32 bit board
with the CryptoCell hardware.
Since no offical source for eboiv test vectors is known,
the test vectors supplied as patch #2 are derived from
sectors which are part of the dm-crypt test suite.
Signed-off-by: Gilad Ben-Yossef
Cc: Eric Biggers
Cc: Milan Broz
Replace the explicit EBOIV handling in the dm-crypt driver with calls
into the crypto API, which now possesses the capability to perform
this processing within the crypto subsystem.
Signed-off-by: Gilad Ben-Yossef
---
drivers/md/dm-crypt.c | 61 ++-
1
in 5.6.
This patch re-implements eboiv as a generic crypto API
template, thus allowing use of a alternative architecture
specific optimzied implementations (as well as saving a
memory allocation along the way).
Signed-off-by: Gilad Ben-Yossef
Cc: Eric Biggers
---
crypto/Kconfig | 23 +
crypto
test suite and on an arm 32 bit board
with the CryptoCell hardware.
Since no offical source for eboiv test vectors is known,
the test vectors supplied as patch #2 are derived from
sectors which are part of the dm-crypt test suite.
Signed-off-by: Gilad Ben-Yossef
Cc: Eric Biggers
Cc: Milan Broz
Replace the explicit EBOIV handling in the dm-crypt driver with calls
into the crypto API, which now possesses the capability to perform
this processing within the crypto subsystem.
Signed-off-by: Gilad Ben-Yossef
---
drivers/md/dm-crypt.c | 61 ++-
1
Add test vectors for the use of the EBOIV template with cbc(aes)
modes as it is being used by dm-crypt for BitLocker support.
Vectors taken from dm-crypt test suite images.
Signed-off-by: Gilad Ben-Yossef
---
crypto/tcrypt.c | 9 ++
crypto/testmgr.c | 6 +
crypto/testmgr.h | 279
in 5.6.
This patch re-implements eboiv as a generic crypto API
template, thus allowing use of a alternative architecture
specific optimzied implementations (as well as saving a
memory allocation along the way).
Signed-off-by: Gilad Ben-Yossef
Cc: Eric Biggers
---
crypto/Kconfig | 23
crypto
BitLocker eboiv support, which was removed in
commit 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
is reintroduced based on the crypto API new support for
eboiv.
Signed-off-by: Gilad Ben-Yossef
Fixes: 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
---
ems that setting CONFIG_EBOIV
default to dm-crypto Kconfig option value does solves the problem, or
have I missed something?
Thanks,
Gilad
--
Gilad Ben-Yossef
Chief Coffee Drinker
values of β will give rise to dom!
--
dm-devel mailing list
dm-devel@redhat.com
https://www.redhat.com/mailman/listinfo/dm-devel
BitLocker eboiv support, which was removed in
commit 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
is reintroduced based on the crypto API new support for
eboiv.
Signed-off-by: Gilad Ben-Yossef
Fixes: 1d8b41ff6991 ("crypto: ccree - remove bitlocker cipher")
---
iv_instance_ctx *ictx;
> struct skcipher_alg *alg;
> u32 mask;
> int err;
...
Thank you very much for the review and assistance. I will send out a
revised version.
Thanks,
Gilad
--
Gilad Ben-Yossef
Chief Coffee Drinker
values of β will give rise to dom!
--
dm-devel mailing
On Mon, Oct 26, 2020 at 9:04 PM Milan Broz wrote:
>
>
>
> On 26/10/2020 19:39, Eric Biggers wrote:
> > On Mon, Oct 26, 2020 at 07:29:57PM +0100, Milan Broz wrote:
> >> On 26/10/2020 18:52, Eric Biggers wrote:
> >>> On Mon, Oct 26, 2020 at 03:04:46PM +0200,
test suite and on an arm 32 bit board
with the CryptoCell hardware.
Since no offical source for eboiv test vectors is known,
the test vectors supplied as patch #2 are derived from
sectors which are part of the dm-crypt test suite.
Gilad Ben-Yossef (4):
crypto: add eboiv as a crypto API template
Replace the explicit EBOIV handling in the dm-crypt driver with calls
into the crypto API, which now possesses the capability to perform
this processing within the crypto subsystem.
Signed-off-by: Gilad Ben-Yossef
---
drivers/md/Kconfig| 1 +
drivers/md/dm-crypt.c | 61
in 5.6.
This patch re-implements eboiv as a generic crypto API
template, thus allowing use of a alternative architecture
specific optimzied implementations (as well as saving a
memory allocation along the way).
Signed-off-by: Gilad Ben-Yossef
---
crypto/Kconfig | 21
crypto/Makefile | 1
Add test vectors for the use of the EBOIV template with cbc(aes)
modes as it is being used by dm-crypt for BitLocker support.
Vectors taken from dm-crypt test suite images.
Signed-off-by: Gilad Ben-Yossef
---
crypto/tcrypt.c | 9 ++
crypto/testmgr.c | 6 +
crypto/testmgr.h | 279
droid tree.
If this makes sense to you perhaps it is a good idea to have the
template format be:
,,,
Where for now we will only support a sector size of '0' (i.e. do not
auto-increment) and later extend or am I over engineering? :-)
Thanks,
Gilad
--
Gilad Ben-Yossef
Chief Coffee Drinker
values of β will give rise to dom!
d
> code would go away entirely except for changing the string "cbc(aes)" to
> "essiv(cbc(aes),sha256,aes)".
I will also add that going the skcipher route rather than shash will
allow hardware tfm providers like CryptoCell that can do the ESSIV
part in hardware implement that
ription.
>
> Historically, there have been several CAAM backlogging implementations
> proposed
> - but all were rejected:
hmmm... obviously the right solution is to implement backlogging but
you might want to consider changing the driver to
return -ENOSPC or -ENOSYS instead in the m
On Mon, Sep 3, 2018 at 9:54 AM, 정혜연 wrote:
>
> Hi Gilad,
>
>
>
> I missed test slot because our test milestone is already ended so I have to
> wait kernel minor up for applying his patch (aosp common kernel).
>
> But I tested by myself to print vmalloc in case of is_vmalloc_addr(data) and
> dm
Hi HyeYeon,
On Wed, Aug 22, 2018 at 8:28 PM, Mike Snitzer wrote:
>
> Can you please see if this patch helps?
>
> https://patchwork.kernel.org/patch/10573051/
>
I'm curious if the patch pointed to by Mike resolved your issue :-)
Gilad
--
Gilad Ben-Yossef
Chief Coffee Drink
Hi,
On Mon, Aug 20, 2018 at 2:33 PM, 정혜연 wrote:
>
> Dear Gilad,
>
>
>
> We found memcopy is not preempted as you explained.
>
> Memcopy make kernel panic at the very first time.
>
> Your comment was very helpful us to find this. Thank you.
>
>
I'm glad I could help.
>
> We found the other
p; walk->offset & alignmask && !err) {
> walk->offset = ALIGN(walk->offset, alignmask + 1);
> nbytes = min(nbytes,
> ((unsigned int)(PAGE_SIZE)) - walk->offset);
> walk->entrylen -= nbytes;
>
> if (nbytes) {
>walk->data += walk->o
I missed sending my reply to the list by myself mistake so forwarding.
-- Forwarded message --
From: Gilad Ben-Yossef
Date: Thu, 16 Aug 2018 09:48:19 +0700
Subject: Re: (2) FW: Use-after-free while dm-verity
To: hyeon.ch...@samsung.com
On 8/16/18, 정혜연 wrote:
> Thank
erify the area the memcpy is applied to is mapped with
kmap_atomic?
thanks!
Gilad
>
> commit d1ac3ff008fb9a48f91fc15920b4c8db24c0f03e
> Author: Gilad Ben-Yossef
> Date: Sun Feb 19 14:46:07 2017 +0200
>
> dm verity: switch to using asynchronous hash crypto API
>
> U
e but in an upstream-able,
community reviewed and accepted fashion.
Of course, breaking it up to stages is fine - it's just that it is
hard to show the benefits if you don't do the full monty
I hope I've managed to shed some light on the matter and would be
happy to supply more details if needed.
89f6a2cfec86fba7a115642ff082cb4e9450ea6
>
> So I'm particulalry interested to hear from google folks to understand
> if they are OK with your proposed verity async crypto API use.
If by "scalable async parallel IO" you mean crypto HW than for what
it's worth, my experience is that
m.com>
> ---
> drivers/md/dm-verity-fec.c| 10 +-
> drivers/md/dm-verity-fec.h| 7 +-
> drivers/md/dm-verity-target.c | 215
> +++---
> drivers/md/dm-verity.h| 4 +-
> 4 files changed, 173 insertions(+), 63 deletions(-)
Chemla <yael.che...@foss.arm.com>
> ---
> drivers/md/dm-verity-target.c | 220
> --
> 1 file changed, 127 insertions(+), 93 deletions(-)
Reviewed-by: Gilad Ben-Yossef <gi...@benyossef.com>
--
Gilad Ben-Yossef
Chief Co
Hi,
I'm adding the linux crypto mailing list because it seems relevant.
On Fri, Feb 23, 2018 at 2:25 PM, Gigi W <gigitekw...@gmail.com> wrote:
> Thanks for the input!
>
> See below
>
>
> On Fri, Feb 23, 2018 at 10:53 AM Gilad Ben-Yossef <gi...@benyossef.com>
>
s broken.
>
>
> Any help is appreciated !
>
> Thanks in advanced and have a nice day.
>
>
> [1] http://cryptodev-linux.org/documentation.html
> [2] https://github.com/nmav/cryptodev-linux/blob/master/examples/sha.c
> [3]
> https://gist.githubusercontent.com/gmircea/6e1cc029ef5ed7a16b0fe
nt
> blocks.
>
> Tested on physical Arm 32 and x86_64 and virtual ARM 64.
>
> Performance numbers were not changed.
>
> Signed-off-by: Yael Chemla <yael.che...@foss.arm.com>
Reviewed-By: Gilad Ben-Yossef <gi...@benyossef.com>
> ---
> drivers/md/dm-verity-target.c
prior to the
async op finishing.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
Documentation/crypto/api-samples.rst | 52 +++-
1 file changed, 10 insertions(+), 42 deletions(-)
diff --git a/Documentation/crypto/api-samples.rst
b/Documentation/cryp
The mediatek driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Ryder Lee <ryder@mediatek.com>
---
drivers/crypto/mediatek/mt
The talitos driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Tested-by: Christophe Leroy <christophe.le...@c-s.fr>
---
drivers/crypto/ta
The qce driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
drivers/crypto/qce/sha.c | 30 --
1 file changed, 4 insertions(+), 26 del
tcrypt starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/tcrypt.c | 84 +
1 file changed, 25 insertions(
ima starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Mimi Zohar <zo...@linux.vnet.ibm.com>
---
security/integrity/ima/ima_c
cifs starts an async. crypto op and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Pavel Shilovsky <pshi...@microsoft.com>
---
fs/cifs/smb2ops.c | 30 --
1 fil
fscrypt starts several async. crypto ops and waiting for them to
complete. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
fs/crypto/crypto.c | 28
fs/crypto/fname.c
testmgr is starting async. crypto ops and waiting for them to complete.
Move it over to generic code doing the same.
This also provides a test of the generic crypto async. wait code.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/testmgr.c
prior to the
async op finishing, should this code ever move to a context
where signals are not masked.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Mikulas Patocka <mpato...@redhat.com>
---
drivers/md/dm-verity-target.c | 81 +++
d
algif starts several async crypto ops and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/af_alg.c | 27 ---
crypto/algif_aead.c | 8
crypto/algif_
for the
completion of the request any way.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/drbg.c | 36 +---
include/crypto/drbg.h | 3 +--
2 files changed, 10 insertions(+), 29 deletions(-)
diff --git a/crypto/drbg.c b/crypto/drbg.c
gcm is starting an async. crypto op and waiting for it complete.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/gcm.c | 32 ++--
1 file changed, 6 insertions(+), 26 deletions(-)
diff --git a/crypto
Replace -EBUSY with -ENOSPC when handling transient busy
indication in the absence of backlog.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
Please squash this patch with the previous one when merging upstream.
net/ipv4/ah4.c | 2 +-
net/ipv4/esp4.c | 2 +-
net/ipv6/ah6.
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/ahash.c| 12 +++-
crypto/cts.c
rolled versions.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Eric Biggers <ebigge...@gmail.com>
CC: Jonathan Cameron <jonathan.came...@huawei.com>
---
crypto/api.c | 13 +
include/linux/crypto.h | 40
2
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Boris Brezillon <boris.brezil...@free-elec
Replace -EBUSY with -ENOSPC when reporting transient busy
indication in the absence of backlog.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Reviewed-by: Gary R Hook <gary.h...@amd.com>
---
Please squash this patch with the previous one when merging upstream.
drivers/cr
st_flags(req) &
CRYPTO_TFM_REQ_MAY_BACKLOG)))
This patch changes the return code used to indicate a crypto op
failed due to the transformation provider being transiently busy
to -ENOSPC.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
c
the change
moving over the algif code which it originated from
to the new API.
- Inline crypto_wait_req().
- Some code indentation fixes.
Gilad Ben-Yossef (20):
crypto: change transient busy return code to -ENOSPC
crypto: ccp: use -ENOSPC for transient busy indication
net: use -ENOSPC for tran
On Tue, Oct 17, 2017 at 5:06 PM, Russell King - ARM Linux
<li...@armlinux.org.uk> wrote:
> On Sun, Oct 15, 2017 at 10:19:45AM +0100, Gilad Ben-Yossef wrote:
>> Many users of kernel async. crypto services have a pattern of
>> starting an async. crypto op and than using a
On Sun, Oct 15, 2017 at 6:38 PM, Herbert Xu <herb...@gondor.apana.org.au> wrote:
>
> On Sun, Oct 15, 2017 at 10:19:45AM +0100, Gilad Ben-Yossef wrote:
> >
> > Changes from v8:
> > - Remove the translation of EAGAIN return code to the
> > previous ret
prior to the
async op finishing.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
Documentation/crypto/api-samples.rst | 52 +++-
1 file changed, 10 insertions(+), 42 deletions(-)
diff --git a/Documentation/crypto/api-samples.rst
b/Documentation/cryp
The mediatek driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Ryder Lee <ryder@mediatek.com>
---
drivers/crypto/mediatek/mt
public_key_verify_signature() is starting an async crypto op and
waiting for it to complete. Move it over to generic code doing
the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/asymmetric_keys/public_key.c | 28
1 file changed, 4 inse
ima starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Mimi Zohar <zo...@linux.vnet.ibm.com>
---
security/integrity/ima/ima_c
The qce driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
drivers/crypto/qce/sha.c | 30 --
1 file changed, 4 insertions(+), 26 del
gcm is starting an async. crypto op and waiting for it complete.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/gcm.c | 32 ++--
1 file changed, 6 insertions(+), 26 deletions(-)
diff --git a/crypto
st_flags(req) &
CRYPTO_TFM_REQ_MAY_BACKLOG)))
This patch changes the return code used to indicate a crypto op
failed due to the transformation provider being transiently busy
to -EAGAIN.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
c
Replace -EBUSY with -EAGAIN when reporting transient busy
indication in the absence of backlog.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Reviewed-by: Gary R Hook <gary.h...@amd.com>
---
Please squash this patch with the previous one when merging upstream.
drivers/cr
algif starts several async crypto ops and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/af_alg.c | 27 ---
crypto/algif_aead.c | 8
crypto/algif_
sting code and rebase
on top of that patch set.
- Rename 'ecr' to 'wait' in fscrypto code.
- Split patch introducing the new API from the change
moving over the algif code which it originated from
to the new API.
- Inline crypto_wait_req().
- Some code indentation fixes.
Gilad Ben-Yossef (20)
The talitos driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
drivers/crypto/talitos.c | 38 +-
1 file changed, 5 insertions(
testmgr is starting async. crypto ops and waiting for them to complete.
Move it over to generic code doing the same.
This also provides a test of the generic crypto async. wait code.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/testmgr.c
cifs starts an async. crypto op and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Pavel Shilovsky <pshi...@microsoft.com>
---
fs/cifs/smb2ops.c | 30 --
1 fil
fscrypt starts several async. crypto ops and waiting for them to
complete. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
fs/crypto/crypto.c | 28
fs/crypto/fname.c
tcrypt starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/tcrypt.c | 84 +
1 file changed, 25 insertions(
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/ahash.c| 12 +++-
crypto/cts.c
Replace -EBUSY with -EAGAIN when handling transient busy
indication in the absence of backlog.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
Please squash this patch with the previous one when merging upstream.
net/ipv4/ah4.c | 2 +-
net/ipv4/esp4.c | 2 +-
net/ipv6/ah6.
for the
completion of the request any way.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/drbg.c | 36 +---
include/crypto/drbg.h | 3 +--
2 files changed, 10 insertions(+), 29 deletions(-)
diff --git a/crypto/drbg.c b/crypto/drbg.c
prior to the
async op finishing, should this code ever move to a context
where signals are not masked.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Mikulas Patocka <mpato...@redhat.com>
---
drivers/md/dm-verity-target.c | 81 +++
d
rolled versions.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Eric Biggers <ebigge...@gmail.com>
CC: Jonathan Cameron <jonathan.came...@huawei.com>
---
crypto/api.c | 13 +
include/linux/crypto.h | 40
2
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Boris Brezillon <boris.brezil...@free-elec
On Sat, Oct 7, 2017 at 6:05 AM, Herbert Xu <herb...@gondor.apana.org.au> wrote:
> On Tue, Sep 05, 2017 at 03:38:40PM +0300, Gilad Ben-Yossef wrote:
>>
>> diff --git a/crypto/algif_hash.c b/crypto/algif_hash.c
>> index 5e92bd2..3b3c154 100644
>> --- a/cr
prior to the
async op finishing.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
Documentation/crypto/api-samples.rst | 52 +++-
1 file changed, 10 insertions(+), 42 deletions(-)
diff --git a/Documentation/crypto/api-samples.rst
b/Documentation/cryp
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Boris Brezillon <boris.brezil...@free-elec
The qce driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
drivers/crypto/qce/sha.c | 30 --
1 file changed, 4 insertions(+), 26 del
tcrypt starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/tcrypt.c | 84 +
1 file changed, 25 insertions(
gcm is starting an async. crypto op and waiting for it complete.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/gcm.c | 32 ++--
1 file changed, 6 insertions(+), 26 deletions(-)
diff --git a/crypto
testmgr is starting async. crypto ops and waiting for them to complete.
Move it over to generic code doing the same.
This also provides a test of the generic crypto async. wait code.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/testmgr.c
he new API.
- Inline crypto_wait_req().
- Some code indentation fixes.
Gilad Ben-Yossef (20):
crypto: change transient busy return code to -EAGAIN
crypto: ccp: use -EAGAIN for transient busy indication
net: use -EAGAIN for transient busy indication
crypto: remove redundant backlog check
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/ahash.c| 12 +++-
crypto/cts.c
The mediatek driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Ryder Lee <ryder@mediatek.com>
---
drivers/crypto/mediatek/mt
ima starts several async crypto ops and waits for their completions.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Mimi Zohar <zo...@linux.vnet.ibm.com>
---
security/integrity/ima/ima_c
public_key_verify_signature() is starting an async crypto op and
waiting for it to complete. Move it over to generic code doing
the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/asymmetric_keys/public_key.c | 28
1 file changed, 4 inse
cifs starts an async. crypto op and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Acked-by: Pavel Shilovsky <pshi...@microsoft.com>
---
fs/cifs/smb2ops.c | 30 --
1 fil
Replace -EBUSY with -EAGAIN when reporting transient busy
indication in the absence of backlog.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
Reviewed-by: Gary R Hook <gary.h...@amd.com>
---
Please squash this patch with the previous one when merging upstream.
---
driver
rolled versions.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Eric Biggers <ebigge...@gmail.com>
CC: Jonathan Cameron <jonathan.came...@huawei.com>
---
crypto/api.c | 13 +
include/linux/crypto.h | 40
2
The talitos driver starts several async crypto ops and waits for their
completions. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
drivers/crypto/talitos.c | 38 +-
1 file changed, 5 insertions(
for the
completion of the request any way.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/drbg.c | 36 +---
include/crypto/drbg.h | 3 +--
2 files changed, 10 insertions(+), 29 deletions(-)
diff --git a/crypto/drbg.c b/crypto/drbg.c
prior to the
async op finishing, should this code ever move to a context
where signals are not masked.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
CC: Mikulas Patocka <mpato...@redhat.com>
---
drivers/md/dm-verity-target.c | 81 +++
d
algif starts several async crypto ops and waits for their completion.
Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto/af_alg.c | 27 ---
crypto/algif_aead.c | 8
crypto/algif_
fscrypt starts several async. crypto ops and waiting for them to
complete. Move it over to generic code doing the same.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
fs/crypto/crypto.c | 28
fs/crypto/fname.c
st_flags(req) &
CRYPTO_TFM_REQ_MAY_BACKLOG)))
This patch changes the return code used to indicate a crypto op
failed due to the transformation provider being transiently busy
to -EAGAIN.
Signed-off-by: Gilad Ben-Yossef <gi...@benyossef.com>
---
crypto
1 - 100 of 251 matches
Mail list logo