1. 26 7月, 2019 4 次提交
  2. 06 6月, 2019 4 次提交
  3. 18 4月, 2019 1 次提交
  4. 25 1月, 2019 1 次提交
    • E
      crypto: clarify name of WEAK_KEY request flag · 231baecd
      Eric Biggers 提交于
      CRYPTO_TFM_REQ_WEAK_KEY confuses newcomers to the crypto API because it
      sounds like it is requesting a weak key.  Actually, it is requesting
      that weak keys be forbidden (for algorithms that have the notion of
      "weak keys"; currently only DES and XTS do).
      
      Also it is only one letter away from CRYPTO_TFM_RES_WEAK_KEY, with which
      it can be easily confused.  (This in fact happened in the UX500 driver,
      though just in some debugging messages.)
      
      Therefore, make the intent clear by renaming it to
      CRYPTO_TFM_REQ_FORBID_WEAK_KEYS.
      Signed-off-by: NEric Biggers <ebiggers@google.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      231baecd
  5. 20 11月, 2018 1 次提交
  6. 20 7月, 2018 2 次提交
  7. 09 7月, 2018 9 次提交
  8. 22 6月, 2018 3 次提交
  9. 27 5月, 2018 9 次提交
  10. 31 3月, 2018 1 次提交
  11. 22 2月, 2018 1 次提交
    • A
      crypto: inside-secure - fix the invalidation step during cra_exit · b7007dbc
      Antoine Tenart 提交于
      When exiting a transformation, the cra_exit() helper is called in each
      driver providing one. The Inside Secure SafeXcel driver has one, which
      is responsible of freeing some areas and of sending one invalidation
      request to the crypto engine, to invalidate the context that was used
      during the transformation.
      
      We could see in some setups (when lots of transformations were being
      used with a short lifetime, and hence lots of cra_exit() calls) NULL
      pointer dereferences and other weird issues. All these issues were
      coming from accessing the tfm context.
      
      The issue is the invalidation request completion is checked using a
      wait_for_completion_interruptible() call in both the cipher and hash
      cra_exit() helpers. In some cases this was interrupted while the
      invalidation request wasn't processed yet. And then cra_exit() returned,
      and its caller was freeing the tfm instance. Only then the request was
      being handled by the SafeXcel driver, which lead to the said issues.
      
      This patch fixes this by using wait_for_completion() calls in these
      specific cases.
      
      Fixes: 1b44c5a6 ("crypto: inside-secure - add SafeXcel EIP197 crypto engine driver")
      Signed-off-by: NAntoine Tenart <antoine.tenart@bootlin.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      b7007dbc
  12. 22 12月, 2017 4 次提交