diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-05-06 23:15:06 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-05-06 23:15:06 -0400 |
commit | 81ff5d2cba4f86cd850b9ee4a530cd221ee45aa3 (patch) | |
tree | 532847c0823dc864e3aa9da6cde863e48157eafa /fs | |
parent | 7aefd944f038c7469571adb37769cb6f3924ecfa (diff) | |
parent | e59f755ceb6d6f39f90899d2a4e39c3e05837e12 (diff) |
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto update from Herbert Xu:
"API:
- Add support for AEAD in simd
- Add fuzz testing to testmgr
- Add panic_on_fail module parameter to testmgr
- Use per-CPU struct instead multiple variables in scompress
- Change verify API for akcipher
Algorithms:
- Convert x86 AEAD algorithms over to simd
- Forbid 2-key 3DES in FIPS mode
- Add EC-RDSA (GOST 34.10) algorithm
Drivers:
- Set output IV with ctr-aes in crypto4xx
- Set output IV in rockchip
- Fix potential length overflow with hashing in sun4i-ss
- Fix computation error with ctr in vmx
- Add SM4 protected keys support in ccree
- Remove long-broken mxc-scc driver
- Add rfc4106(gcm(aes)) cipher support in cavium/nitrox"
* 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (179 commits)
crypto: ccree - use a proper le32 type for le32 val
crypto: ccree - remove set but not used variable 'du_size'
crypto: ccree - Make cc_sec_disable static
crypto: ccree - fix spelling mistake "protedcted" -> "protected"
crypto: caam/qi2 - generate hash keys in-place
crypto: caam/qi2 - fix DMA mapping of stack memory
crypto: caam/qi2 - fix zero-length buffer DMA mapping
crypto: stm32/cryp - update to return iv_out
crypto: stm32/cryp - remove request mutex protection
crypto: stm32/cryp - add weak key check for DES
crypto: atmel - remove set but not used variable 'alg_name'
crypto: picoxcell - Use dev_get_drvdata()
crypto: crypto4xx - get rid of redundant using_sd variable
crypto: crypto4xx - use sync skcipher for fallback
crypto: crypto4xx - fix cfb and ofb "overran dst buffer" issues
crypto: crypto4xx - fix ctr-aes missing output IV
crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o
crypto: ccree - handle tee fips error during power management resume
crypto: ccree - add function to handle cryptocell tee fips error
...
Diffstat (limited to 'fs')
-rw-r--r-- | fs/cifs/misc.c | 1 | ||||
-rw-r--r-- | fs/crypto/keyinfo.c | 1 | ||||
-rw-r--r-- | fs/ecryptfs/crypto.c | 1 | ||||
-rw-r--r-- | fs/ecryptfs/keystore.c | 1 | ||||
-rw-r--r-- | fs/ext4/ext4.h | 1 | ||||
-rw-r--r-- | fs/f2fs/f2fs.h | 1 | ||||
-rw-r--r-- | fs/nfsd/nfs4recover.c | 1 | ||||
-rw-r--r-- | fs/ubifs/auth.c | 6 | ||||
-rw-r--r-- | fs/ubifs/replay.c | 2 |
9 files changed, 0 insertions, 15 deletions
diff --git a/fs/cifs/misc.c b/fs/cifs/misc.c index 0dc6f08020ac..b1a696a73f7c 100644 --- a/fs/cifs/misc.c +++ b/fs/cifs/misc.c | |||
@@ -959,7 +959,6 @@ cifs_alloc_hash(const char *name, | |||
959 | } | 959 | } |
960 | 960 | ||
961 | (*sdesc)->shash.tfm = *shash; | 961 | (*sdesc)->shash.tfm = *shash; |
962 | (*sdesc)->shash.flags = 0x0; | ||
963 | return 0; | 962 | return 0; |
964 | } | 963 | } |
965 | 964 | ||
diff --git a/fs/crypto/keyinfo.c b/fs/crypto/keyinfo.c index 322ce9686bdb..2cb4956f8511 100644 --- a/fs/crypto/keyinfo.c +++ b/fs/crypto/keyinfo.c | |||
@@ -402,7 +402,6 @@ static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) | |||
402 | { | 402 | { |
403 | SHASH_DESC_ON_STACK(desc, tfm); | 403 | SHASH_DESC_ON_STACK(desc, tfm); |
404 | desc->tfm = tfm; | 404 | desc->tfm = tfm; |
405 | desc->flags = 0; | ||
406 | 405 | ||
407 | return crypto_shash_digest(desc, key, keysize, salt); | 406 | return crypto_shash_digest(desc, key, keysize, salt); |
408 | } | 407 | } |
diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index f664da55234e..491cf5baa8c2 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c | |||
@@ -68,7 +68,6 @@ static int ecryptfs_hash_digest(struct crypto_shash *tfm, | |||
68 | int err; | 68 | int err; |
69 | 69 | ||
70 | desc->tfm = tfm; | 70 | desc->tfm = tfm; |
71 | desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
72 | err = crypto_shash_digest(desc, src, len, dst); | 71 | err = crypto_shash_digest(desc, src, len, dst); |
73 | shash_desc_zero(desc); | 72 | shash_desc_zero(desc); |
74 | return err; | 73 | return err; |
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c index e74fe84d0886..90fbac5d485b 100644 --- a/fs/ecryptfs/keystore.c +++ b/fs/ecryptfs/keystore.c | |||
@@ -769,7 +769,6 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
769 | } | 769 | } |
770 | 770 | ||
771 | s->hash_desc->tfm = s->hash_tfm; | 771 | s->hash_desc->tfm = s->hash_tfm; |
772 | s->hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
773 | 772 | ||
774 | rc = crypto_shash_digest(s->hash_desc, | 773 | rc = crypto_shash_digest(s->hash_desc, |
775 | (u8 *)s->auth_tok->token.password.session_key_encryption_key, | 774 | (u8 *)s->auth_tok->token.password.session_key_encryption_key, |
diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h index 82ffdacdc7fa..0833b5fc0668 100644 --- a/fs/ext4/ext4.h +++ b/fs/ext4/ext4.h | |||
@@ -2024,7 +2024,6 @@ static inline u32 ext4_chksum(struct ext4_sb_info *sbi, u32 crc, | |||
2024 | BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver)!=sizeof(desc.ctx)); | 2024 | BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver)!=sizeof(desc.ctx)); |
2025 | 2025 | ||
2026 | desc.shash.tfm = sbi->s_chksum_driver; | 2026 | desc.shash.tfm = sbi->s_chksum_driver; |
2027 | desc.shash.flags = 0; | ||
2028 | *(u32 *)desc.ctx = crc; | 2027 | *(u32 *)desc.ctx = crc; |
2029 | 2028 | ||
2030 | BUG_ON(crypto_shash_update(&desc.shash, address, length)); | 2029 | BUG_ON(crypto_shash_update(&desc.shash, address, length)); |
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h index 87f75ebd2fd6..21b0ab6bd15a 100644 --- a/fs/f2fs/f2fs.h +++ b/fs/f2fs/f2fs.h | |||
@@ -1422,7 +1422,6 @@ static inline u32 __f2fs_crc32(struct f2fs_sb_info *sbi, u32 crc, | |||
1422 | BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver) != sizeof(desc.ctx)); | 1422 | BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver) != sizeof(desc.ctx)); |
1423 | 1423 | ||
1424 | desc.shash.tfm = sbi->s_chksum_driver; | 1424 | desc.shash.tfm = sbi->s_chksum_driver; |
1425 | desc.shash.flags = 0; | ||
1426 | *(u32 *)desc.ctx = crc; | 1425 | *(u32 *)desc.ctx = crc; |
1427 | 1426 | ||
1428 | err = crypto_shash_update(&desc.shash, address, length); | 1427 | err = crypto_shash_update(&desc.shash, address, length); |
diff --git a/fs/nfsd/nfs4recover.c b/fs/nfsd/nfs4recover.c index 5188f9f70c78..8c8563441208 100644 --- a/fs/nfsd/nfs4recover.c +++ b/fs/nfsd/nfs4recover.c | |||
@@ -126,7 +126,6 @@ nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname) | |||
126 | SHASH_DESC_ON_STACK(desc, tfm); | 126 | SHASH_DESC_ON_STACK(desc, tfm); |
127 | 127 | ||
128 | desc->tfm = tfm; | 128 | desc->tfm = tfm; |
129 | desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
130 | 129 | ||
131 | status = crypto_shash_digest(desc, clname->data, clname->len, | 130 | status = crypto_shash_digest(desc, clname->data, clname->len, |
132 | cksum.data); | 131 | cksum.data); |
diff --git a/fs/ubifs/auth.c b/fs/ubifs/auth.c index 5bf5fd08879e..b758004085c4 100644 --- a/fs/ubifs/auth.c +++ b/fs/ubifs/auth.c | |||
@@ -33,7 +33,6 @@ int __ubifs_node_calc_hash(const struct ubifs_info *c, const void *node, | |||
33 | int err; | 33 | int err; |
34 | 34 | ||
35 | shash->tfm = c->hash_tfm; | 35 | shash->tfm = c->hash_tfm; |
36 | shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
37 | 36 | ||
38 | err = crypto_shash_digest(shash, node, le32_to_cpu(ch->len), hash); | 37 | err = crypto_shash_digest(shash, node, le32_to_cpu(ch->len), hash); |
39 | if (err < 0) | 38 | if (err < 0) |
@@ -56,7 +55,6 @@ static int ubifs_hash_calc_hmac(const struct ubifs_info *c, const u8 *hash, | |||
56 | int err; | 55 | int err; |
57 | 56 | ||
58 | shash->tfm = c->hmac_tfm; | 57 | shash->tfm = c->hmac_tfm; |
59 | shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
60 | 58 | ||
61 | err = crypto_shash_digest(shash, hash, c->hash_len, hmac); | 59 | err = crypto_shash_digest(shash, hash, c->hash_len, hmac); |
62 | if (err < 0) | 60 | if (err < 0) |
@@ -88,7 +86,6 @@ int ubifs_prepare_auth_node(struct ubifs_info *c, void *node, | |||
88 | return -ENOMEM; | 86 | return -ENOMEM; |
89 | 87 | ||
90 | hash_desc->tfm = c->hash_tfm; | 88 | hash_desc->tfm = c->hash_tfm; |
91 | hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
92 | ubifs_shash_copy_state(c, inhash, hash_desc); | 89 | ubifs_shash_copy_state(c, inhash, hash_desc); |
93 | 90 | ||
94 | err = crypto_shash_final(hash_desc, hash); | 91 | err = crypto_shash_final(hash_desc, hash); |
@@ -123,7 +120,6 @@ static struct shash_desc *ubifs_get_desc(const struct ubifs_info *c, | |||
123 | return ERR_PTR(-ENOMEM); | 120 | return ERR_PTR(-ENOMEM); |
124 | 121 | ||
125 | desc->tfm = tfm; | 122 | desc->tfm = tfm; |
126 | desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
127 | 123 | ||
128 | err = crypto_shash_init(desc); | 124 | err = crypto_shash_init(desc); |
129 | if (err) { | 125 | if (err) { |
@@ -364,7 +360,6 @@ static int ubifs_node_calc_hmac(const struct ubifs_info *c, const void *node, | |||
364 | ubifs_assert(c, ofs_hmac + hmac_len < len); | 360 | ubifs_assert(c, ofs_hmac + hmac_len < len); |
365 | 361 | ||
366 | shash->tfm = c->hmac_tfm; | 362 | shash->tfm = c->hmac_tfm; |
367 | shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
368 | 363 | ||
369 | err = crypto_shash_init(shash); | 364 | err = crypto_shash_init(shash); |
370 | if (err) | 365 | if (err) |
@@ -483,7 +478,6 @@ int ubifs_hmac_wkm(struct ubifs_info *c, u8 *hmac) | |||
483 | return 0; | 478 | return 0; |
484 | 479 | ||
485 | shash->tfm = c->hmac_tfm; | 480 | shash->tfm = c->hmac_tfm; |
486 | shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
487 | 481 | ||
488 | err = crypto_shash_init(shash); | 482 | err = crypto_shash_init(shash); |
489 | if (err) | 483 | if (err) |
diff --git a/fs/ubifs/replay.c b/fs/ubifs/replay.c index 0a0e65c07c6d..5c8a81a019a4 100644 --- a/fs/ubifs/replay.c +++ b/fs/ubifs/replay.c | |||
@@ -576,7 +576,6 @@ static int authenticate_sleb_hash(struct ubifs_info *c, struct shash_desc *log_h | |||
576 | SHASH_DESC_ON_STACK(hash_desc, c->hash_tfm); | 576 | SHASH_DESC_ON_STACK(hash_desc, c->hash_tfm); |
577 | 577 | ||
578 | hash_desc->tfm = c->hash_tfm; | 578 | hash_desc->tfm = c->hash_tfm; |
579 | hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
580 | 579 | ||
581 | ubifs_shash_copy_state(c, log_hash, hash_desc); | 580 | ubifs_shash_copy_state(c, log_hash, hash_desc); |
582 | return crypto_shash_final(hash_desc, hash); | 581 | return crypto_shash_final(hash_desc, hash); |
@@ -587,7 +586,6 @@ static int authenticate_sleb_hmac(struct ubifs_info *c, u8 *hash, u8 *hmac) | |||
587 | SHASH_DESC_ON_STACK(hmac_desc, c->hmac_tfm); | 586 | SHASH_DESC_ON_STACK(hmac_desc, c->hmac_tfm); |
588 | 587 | ||
589 | hmac_desc->tfm = c->hmac_tfm; | 588 | hmac_desc->tfm = c->hmac_tfm; |
590 | hmac_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP; | ||
591 | 589 | ||
592 | return crypto_shash_digest(hmac_desc, hash, c->hash_len, hmac); | 590 | return crypto_shash_digest(hmac_desc, hash, c->hash_len, hmac); |
593 | } | 591 | } |