summaryrefslogtreecommitdiffstats
path: root/fs
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2019-05-06 23:15:06 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2019-05-06 23:15:06 -0400
commit81ff5d2cba4f86cd850b9ee4a530cd221ee45aa3 (patch)
tree532847c0823dc864e3aa9da6cde863e48157eafa /fs
parent7aefd944f038c7469571adb37769cb6f3924ecfa (diff)
parente59f755ceb6d6f39f90899d2a4e39c3e05837e12 (diff)
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto update from Herbert Xu: "API: - Add support for AEAD in simd - Add fuzz testing to testmgr - Add panic_on_fail module parameter to testmgr - Use per-CPU struct instead multiple variables in scompress - Change verify API for akcipher Algorithms: - Convert x86 AEAD algorithms over to simd - Forbid 2-key 3DES in FIPS mode - Add EC-RDSA (GOST 34.10) algorithm Drivers: - Set output IV with ctr-aes in crypto4xx - Set output IV in rockchip - Fix potential length overflow with hashing in sun4i-ss - Fix computation error with ctr in vmx - Add SM4 protected keys support in ccree - Remove long-broken mxc-scc driver - Add rfc4106(gcm(aes)) cipher support in cavium/nitrox" * 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (179 commits) crypto: ccree - use a proper le32 type for le32 val crypto: ccree - remove set but not used variable 'du_size' crypto: ccree - Make cc_sec_disable static crypto: ccree - fix spelling mistake "protedcted" -> "protected" crypto: caam/qi2 - generate hash keys in-place crypto: caam/qi2 - fix DMA mapping of stack memory crypto: caam/qi2 - fix zero-length buffer DMA mapping crypto: stm32/cryp - update to return iv_out crypto: stm32/cryp - remove request mutex protection crypto: stm32/cryp - add weak key check for DES crypto: atmel - remove set but not used variable 'alg_name' crypto: picoxcell - Use dev_get_drvdata() crypto: crypto4xx - get rid of redundant using_sd variable crypto: crypto4xx - use sync skcipher for fallback crypto: crypto4xx - fix cfb and ofb "overran dst buffer" issues crypto: crypto4xx - fix ctr-aes missing output IV crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o crypto: ccree - handle tee fips error during power management resume crypto: ccree - add function to handle cryptocell tee fips error ...
Diffstat (limited to 'fs')
-rw-r--r--fs/cifs/misc.c1
-rw-r--r--fs/crypto/keyinfo.c1
-rw-r--r--fs/ecryptfs/crypto.c1
-rw-r--r--fs/ecryptfs/keystore.c1
-rw-r--r--fs/ext4/ext4.h1
-rw-r--r--fs/f2fs/f2fs.h1
-rw-r--r--fs/nfsd/nfs4recover.c1
-rw-r--r--fs/ubifs/auth.c6
-rw-r--r--fs/ubifs/replay.c2
9 files changed, 0 insertions, 15 deletions
diff --git a/fs/cifs/misc.c b/fs/cifs/misc.c
index 0dc6f08020ac..b1a696a73f7c 100644
--- a/fs/cifs/misc.c
+++ b/fs/cifs/misc.c
@@ -959,7 +959,6 @@ cifs_alloc_hash(const char *name,
959 } 959 }
960 960
961 (*sdesc)->shash.tfm = *shash; 961 (*sdesc)->shash.tfm = *shash;
962 (*sdesc)->shash.flags = 0x0;
963 return 0; 962 return 0;
964} 963}
965 964
diff --git a/fs/crypto/keyinfo.c b/fs/crypto/keyinfo.c
index 322ce9686bdb..2cb4956f8511 100644
--- a/fs/crypto/keyinfo.c
+++ b/fs/crypto/keyinfo.c
@@ -402,7 +402,6 @@ static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt)
402 { 402 {
403 SHASH_DESC_ON_STACK(desc, tfm); 403 SHASH_DESC_ON_STACK(desc, tfm);
404 desc->tfm = tfm; 404 desc->tfm = tfm;
405 desc->flags = 0;
406 405
407 return crypto_shash_digest(desc, key, keysize, salt); 406 return crypto_shash_digest(desc, key, keysize, salt);
408 } 407 }
diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c
index f664da55234e..491cf5baa8c2 100644
--- a/fs/ecryptfs/crypto.c
+++ b/fs/ecryptfs/crypto.c
@@ -68,7 +68,6 @@ static int ecryptfs_hash_digest(struct crypto_shash *tfm,
68 int err; 68 int err;
69 69
70 desc->tfm = tfm; 70 desc->tfm = tfm;
71 desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
72 err = crypto_shash_digest(desc, src, len, dst); 71 err = crypto_shash_digest(desc, src, len, dst);
73 shash_desc_zero(desc); 72 shash_desc_zero(desc);
74 return err; 73 return err;
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c
index e74fe84d0886..90fbac5d485b 100644
--- a/fs/ecryptfs/keystore.c
+++ b/fs/ecryptfs/keystore.c
@@ -769,7 +769,6 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes,
769 } 769 }
770 770
771 s->hash_desc->tfm = s->hash_tfm; 771 s->hash_desc->tfm = s->hash_tfm;
772 s->hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
773 772
774 rc = crypto_shash_digest(s->hash_desc, 773 rc = crypto_shash_digest(s->hash_desc,
775 (u8 *)s->auth_tok->token.password.session_key_encryption_key, 774 (u8 *)s->auth_tok->token.password.session_key_encryption_key,
diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h
index 82ffdacdc7fa..0833b5fc0668 100644
--- a/fs/ext4/ext4.h
+++ b/fs/ext4/ext4.h
@@ -2024,7 +2024,6 @@ static inline u32 ext4_chksum(struct ext4_sb_info *sbi, u32 crc,
2024 BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver)!=sizeof(desc.ctx)); 2024 BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver)!=sizeof(desc.ctx));
2025 2025
2026 desc.shash.tfm = sbi->s_chksum_driver; 2026 desc.shash.tfm = sbi->s_chksum_driver;
2027 desc.shash.flags = 0;
2028 *(u32 *)desc.ctx = crc; 2027 *(u32 *)desc.ctx = crc;
2029 2028
2030 BUG_ON(crypto_shash_update(&desc.shash, address, length)); 2029 BUG_ON(crypto_shash_update(&desc.shash, address, length));
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index 87f75ebd2fd6..21b0ab6bd15a 100644
--- a/fs/f2fs/f2fs.h
+++ b/fs/f2fs/f2fs.h
@@ -1422,7 +1422,6 @@ static inline u32 __f2fs_crc32(struct f2fs_sb_info *sbi, u32 crc,
1422 BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver) != sizeof(desc.ctx)); 1422 BUG_ON(crypto_shash_descsize(sbi->s_chksum_driver) != sizeof(desc.ctx));
1423 1423
1424 desc.shash.tfm = sbi->s_chksum_driver; 1424 desc.shash.tfm = sbi->s_chksum_driver;
1425 desc.shash.flags = 0;
1426 *(u32 *)desc.ctx = crc; 1425 *(u32 *)desc.ctx = crc;
1427 1426
1428 err = crypto_shash_update(&desc.shash, address, length); 1427 err = crypto_shash_update(&desc.shash, address, length);
diff --git a/fs/nfsd/nfs4recover.c b/fs/nfsd/nfs4recover.c
index 5188f9f70c78..8c8563441208 100644
--- a/fs/nfsd/nfs4recover.c
+++ b/fs/nfsd/nfs4recover.c
@@ -126,7 +126,6 @@ nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
126 SHASH_DESC_ON_STACK(desc, tfm); 126 SHASH_DESC_ON_STACK(desc, tfm);
127 127
128 desc->tfm = tfm; 128 desc->tfm = tfm;
129 desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
130 129
131 status = crypto_shash_digest(desc, clname->data, clname->len, 130 status = crypto_shash_digest(desc, clname->data, clname->len,
132 cksum.data); 131 cksum.data);
diff --git a/fs/ubifs/auth.c b/fs/ubifs/auth.c
index 5bf5fd08879e..b758004085c4 100644
--- a/fs/ubifs/auth.c
+++ b/fs/ubifs/auth.c
@@ -33,7 +33,6 @@ int __ubifs_node_calc_hash(const struct ubifs_info *c, const void *node,
33 int err; 33 int err;
34 34
35 shash->tfm = c->hash_tfm; 35 shash->tfm = c->hash_tfm;
36 shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
37 36
38 err = crypto_shash_digest(shash, node, le32_to_cpu(ch->len), hash); 37 err = crypto_shash_digest(shash, node, le32_to_cpu(ch->len), hash);
39 if (err < 0) 38 if (err < 0)
@@ -56,7 +55,6 @@ static int ubifs_hash_calc_hmac(const struct ubifs_info *c, const u8 *hash,
56 int err; 55 int err;
57 56
58 shash->tfm = c->hmac_tfm; 57 shash->tfm = c->hmac_tfm;
59 shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
60 58
61 err = crypto_shash_digest(shash, hash, c->hash_len, hmac); 59 err = crypto_shash_digest(shash, hash, c->hash_len, hmac);
62 if (err < 0) 60 if (err < 0)
@@ -88,7 +86,6 @@ int ubifs_prepare_auth_node(struct ubifs_info *c, void *node,
88 return -ENOMEM; 86 return -ENOMEM;
89 87
90 hash_desc->tfm = c->hash_tfm; 88 hash_desc->tfm = c->hash_tfm;
91 hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
92 ubifs_shash_copy_state(c, inhash, hash_desc); 89 ubifs_shash_copy_state(c, inhash, hash_desc);
93 90
94 err = crypto_shash_final(hash_desc, hash); 91 err = crypto_shash_final(hash_desc, hash);
@@ -123,7 +120,6 @@ static struct shash_desc *ubifs_get_desc(const struct ubifs_info *c,
123 return ERR_PTR(-ENOMEM); 120 return ERR_PTR(-ENOMEM);
124 121
125 desc->tfm = tfm; 122 desc->tfm = tfm;
126 desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
127 123
128 err = crypto_shash_init(desc); 124 err = crypto_shash_init(desc);
129 if (err) { 125 if (err) {
@@ -364,7 +360,6 @@ static int ubifs_node_calc_hmac(const struct ubifs_info *c, const void *node,
364 ubifs_assert(c, ofs_hmac + hmac_len < len); 360 ubifs_assert(c, ofs_hmac + hmac_len < len);
365 361
366 shash->tfm = c->hmac_tfm; 362 shash->tfm = c->hmac_tfm;
367 shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
368 363
369 err = crypto_shash_init(shash); 364 err = crypto_shash_init(shash);
370 if (err) 365 if (err)
@@ -483,7 +478,6 @@ int ubifs_hmac_wkm(struct ubifs_info *c, u8 *hmac)
483 return 0; 478 return 0;
484 479
485 shash->tfm = c->hmac_tfm; 480 shash->tfm = c->hmac_tfm;
486 shash->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
487 481
488 err = crypto_shash_init(shash); 482 err = crypto_shash_init(shash);
489 if (err) 483 if (err)
diff --git a/fs/ubifs/replay.c b/fs/ubifs/replay.c
index 0a0e65c07c6d..5c8a81a019a4 100644
--- a/fs/ubifs/replay.c
+++ b/fs/ubifs/replay.c
@@ -576,7 +576,6 @@ static int authenticate_sleb_hash(struct ubifs_info *c, struct shash_desc *log_h
576 SHASH_DESC_ON_STACK(hash_desc, c->hash_tfm); 576 SHASH_DESC_ON_STACK(hash_desc, c->hash_tfm);
577 577
578 hash_desc->tfm = c->hash_tfm; 578 hash_desc->tfm = c->hash_tfm;
579 hash_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
580 579
581 ubifs_shash_copy_state(c, log_hash, hash_desc); 580 ubifs_shash_copy_state(c, log_hash, hash_desc);
582 return crypto_shash_final(hash_desc, hash); 581 return crypto_shash_final(hash_desc, hash);
@@ -587,7 +586,6 @@ static int authenticate_sleb_hmac(struct ubifs_info *c, u8 *hash, u8 *hmac)
587 SHASH_DESC_ON_STACK(hmac_desc, c->hmac_tfm); 586 SHASH_DESC_ON_STACK(hmac_desc, c->hmac_tfm);
588 587
589 hmac_desc->tfm = c->hmac_tfm; 588 hmac_desc->tfm = c->hmac_tfm;
590 hmac_desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
591 589
592 return crypto_shash_digest(hmac_desc, hash, c->hash_len, hmac); 590 return crypto_shash_digest(hmac_desc, hash, c->hash_len, hmac);
593} 591}