1. 09 8月, 2016 9 次提交
  2. 01 7月, 2016 1 次提交
  3. 25 5月, 2016 1 次提交
    • T
      crypto: ccp - Fix AES XTS error for request sizes above 4096 · ab6a11a7
      Tom Lendacky 提交于
      The ccp-crypto module for AES XTS support has a bug that can allow requests
      greater than 4096 bytes in size to be passed to the CCP hardware. The CCP
      hardware does not support request sizes larger than 4096, resulting in
      incorrect output. The request should actually be handled by the fallback
      mechanism instantiated by the ccp-crypto module.
      
      Add a check to insure the request size is less than or equal to the maximum
      supported size and use the fallback mechanism if it is not.
      
      Cc: <stable@vger.kernel.org> # 3.14.x-
      Signed-off-by: NTom Lendacky <thomas.lendacky@amd.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      ab6a11a7
  4. 03 5月, 2016 1 次提交
  5. 25 4月, 2016 1 次提交
  6. 20 4月, 2016 1 次提交
    • G
      crypto: ccp - Register the CCP as a DMA resource · 58ea8abf
      Gary R Hook 提交于
      The CCP has the ability to provide DMA services to the
      kernel using pass-through mode of the device. Register
      these services as general purpose DMA channels.
      
      Changes since v2:
      - Add a Signed-off-by
      
      Changes since v1:
      - Allocate memory for a string in ccp_dmaengine_register
      - Ensure register/unregister calls are properly ordered
      - Verified all changed files are listed in the diffstat
      - Undo some superfluous changes
      - Added a cc:
      Signed-off-by: NGary R Hook <gary.hook@amd.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      58ea8abf
  7. 15 4月, 2016 2 次提交
  8. 17 3月, 2016 1 次提交
  9. 11 3月, 2016 4 次提交
  10. 28 2月, 2016 1 次提交
  11. 06 2月, 2016 1 次提交
  12. 01 2月, 2016 1 次提交
  13. 25 1月, 2016 1 次提交
    • T
      crypto: ccp - Add hash state import and export support · 952bce97
      Tom Lendacky 提交于
      Commit 8996eafd ("crypto: ahash - ensure statesize is non-zero")
      added a check to prevent ahash algorithms from successfully registering
      if the import and export functions were not implemented. This prevents
      an oops in the hash_accept function of algif_hash. This commit causes
      the ccp-crypto module SHA support and AES CMAC support from successfully
      registering and causing the ccp-crypto module load to fail because the
      ahash import and export functions are not implemented.
      
      Update the CCP Crypto API support to provide import and export support
      for ahash algorithms.
      
      Cc: <stable@vger.kernel.org> # 3.14.x-
      Signed-off-by: NTom Lendacky <thomas.lendacky@amd.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      952bce97
  14. 25 12月, 2015 1 次提交
  15. 22 12月, 2015 1 次提交
  16. 07 11月, 2015 1 次提交
  17. 08 10月, 2015 4 次提交
  18. 06 7月, 2015 1 次提交
  19. 18 6月, 2015 1 次提交
    • H
      crypto: drivers - Fix Kconfig selects · 596103cf
      Herbert Xu 提交于
      This patch fixes a number of problems in crypto driver Kconfig
      entries:
      
      1. Select BLKCIPHER instead of BLKCIPHER2.  The latter is internal
      and should not be used outside of the crypto API itself.
      2. Do not select ALGAPI unless you use a legacy type like
      CRYPTO_ALG_TYPE_CIPHER.
      3. Select the algorithm type that you are implementing, e.g., AEAD.
      4. Do not select generic C code such as CBC/ECB unless you use them
      as a fallback.
      5. Remove default n since that is the default default.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      596103cf
  20. 15 6月, 2015 1 次提交
  21. 03 6月, 2015 1 次提交
    • T
      crypto: ccp - Protect against poorly marked end of sg list · fb43f694
      Tom Lendacky 提交于
      Scatter gather lists can be created with more available entries than are
      actually used (e.g. using sg_init_table() to reserve a specific number
      of sg entries, but in actuality using something less than that based on
      the data length).  The caller sometimes fails to mark the last entry
      with sg_mark_end().  In these cases, sg_nents() will return the original
      size of the sg list as opposed to the actual number of sg entries that
      contain valid data.
      
      On arm64, if the sg_nents() value is used in a call to dma_map_sg() in
      this situation, then it causes a BUG_ON in lib/swiotlb.c because an
      "empty" sg list entry results in dma_capable() returning false and
      swiotlb trying to create a bounce buffer of size 0. This occurred in
      the userspace crypto interface before being fixed by
      
      0f477b65 ("crypto: algif - Mark sgl end at the end of data")
      
      Protect against this by using the new sg_nents_for_len() function which
      returns only the number of sg entries required to meet the desired
      length and supplying that value to dma_map_sg().
      Signed-off-by: NTom Lendacky <thomas.lendacky@amd.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      fb43f694
  22. 27 5月, 2015 2 次提交
  23. 27 2月, 2015 2 次提交