summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
Diffstat (limited to 'crypto')
-rw-r--r--crypto/algif_aead.c4
-rw-r--r--crypto/algif_skcipher.c4
-rw-r--r--crypto/asymmetric_keys/x509_public_key.c2
-rw-r--r--crypto/hash_info.c2
4 files changed, 8 insertions, 4 deletions
diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c
index 4c93b8a4e81e..147069c9afd0 100644
--- a/crypto/algif_aead.c
+++ b/crypto/algif_aead.c
@@ -106,7 +106,7 @@ static void aead_wmem_wakeup(struct sock *sk)
106 106
107 rcu_read_lock(); 107 rcu_read_lock();
108 wq = rcu_dereference(sk->sk_wq); 108 wq = rcu_dereference(sk->sk_wq);
109 if (wq_has_sleeper(wq)) 109 if (skwq_has_sleeper(wq))
110 wake_up_interruptible_sync_poll(&wq->wait, POLLIN | 110 wake_up_interruptible_sync_poll(&wq->wait, POLLIN |
111 POLLRDNORM | 111 POLLRDNORM |
112 POLLRDBAND); 112 POLLRDBAND);
@@ -157,7 +157,7 @@ static void aead_data_wakeup(struct sock *sk)
157 157
158 rcu_read_lock(); 158 rcu_read_lock();
159 wq = rcu_dereference(sk->sk_wq); 159 wq = rcu_dereference(sk->sk_wq);
160 if (wq_has_sleeper(wq)) 160 if (skwq_has_sleeper(wq))
161 wake_up_interruptible_sync_poll(&wq->wait, POLLOUT | 161 wake_up_interruptible_sync_poll(&wq->wait, POLLOUT |
162 POLLRDNORM | 162 POLLRDNORM |
163 POLLRDBAND); 163 POLLRDBAND);
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index a81c10faf9c4..38c1aa89d3a0 100644
--- a/crypto/algif_skcipher.c
+++ b/crypto/algif_skcipher.c
@@ -243,7 +243,7 @@ static void skcipher_wmem_wakeup(struct sock *sk)
243 243
244 rcu_read_lock(); 244 rcu_read_lock();
245 wq = rcu_dereference(sk->sk_wq); 245 wq = rcu_dereference(sk->sk_wq);
246 if (wq_has_sleeper(wq)) 246 if (skwq_has_sleeper(wq))
247 wake_up_interruptible_sync_poll(&wq->wait, POLLIN | 247 wake_up_interruptible_sync_poll(&wq->wait, POLLIN |
248 POLLRDNORM | 248 POLLRDNORM |
249 POLLRDBAND); 249 POLLRDBAND);
@@ -293,7 +293,7 @@ static void skcipher_data_wakeup(struct sock *sk)
293 293
294 rcu_read_lock(); 294 rcu_read_lock();
295 wq = rcu_dereference(sk->sk_wq); 295 wq = rcu_dereference(sk->sk_wq);
296 if (wq_has_sleeper(wq)) 296 if (skwq_has_sleeper(wq))
297 wake_up_interruptible_sync_poll(&wq->wait, POLLOUT | 297 wake_up_interruptible_sync_poll(&wq->wait, POLLOUT |
298 POLLRDNORM | 298 POLLRDNORM |
299 POLLRDBAND); 299 POLLRDBAND);
diff --git a/crypto/asymmetric_keys/x509_public_key.c b/crypto/asymmetric_keys/x509_public_key.c
index 2a44b3752471..9e9e5a6a9ed6 100644
--- a/crypto/asymmetric_keys/x509_public_key.c
+++ b/crypto/asymmetric_keys/x509_public_key.c
@@ -321,6 +321,8 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
321 goto error_free_cert; 321 goto error_free_cert;
322 } else if (!prep->trusted) { 322 } else if (!prep->trusted) {
323 ret = x509_validate_trust(cert, get_system_trusted_keyring()); 323 ret = x509_validate_trust(cert, get_system_trusted_keyring());
324 if (ret)
325 ret = x509_validate_trust(cert, get_ima_mok_keyring());
324 if (!ret) 326 if (!ret)
325 prep->trusted = 1; 327 prep->trusted = 1;
326 } 328 }
diff --git a/crypto/hash_info.c b/crypto/hash_info.c
index 3e7ff46f26e8..7b1e0b188ce6 100644
--- a/crypto/hash_info.c
+++ b/crypto/hash_info.c
@@ -31,6 +31,7 @@ const char *const hash_algo_name[HASH_ALGO__LAST] = {
31 [HASH_ALGO_TGR_128] = "tgr128", 31 [HASH_ALGO_TGR_128] = "tgr128",
32 [HASH_ALGO_TGR_160] = "tgr160", 32 [HASH_ALGO_TGR_160] = "tgr160",
33 [HASH_ALGO_TGR_192] = "tgr192", 33 [HASH_ALGO_TGR_192] = "tgr192",
34 [HASH_ALGO_SM3_256] = "sm3-256",
34}; 35};
35EXPORT_SYMBOL_GPL(hash_algo_name); 36EXPORT_SYMBOL_GPL(hash_algo_name);
36 37
@@ -52,5 +53,6 @@ const int hash_digest_size[HASH_ALGO__LAST] = {
52 [HASH_ALGO_TGR_128] = TGR128_DIGEST_SIZE, 53 [HASH_ALGO_TGR_128] = TGR128_DIGEST_SIZE,
53 [HASH_ALGO_TGR_160] = TGR160_DIGEST_SIZE, 54 [HASH_ALGO_TGR_160] = TGR160_DIGEST_SIZE,
54 [HASH_ALGO_TGR_192] = TGR192_DIGEST_SIZE, 55 [HASH_ALGO_TGR_192] = TGR192_DIGEST_SIZE,
56 [HASH_ALGO_SM3_256] = SM3256_DIGEST_SIZE,
55}; 57};
56EXPORT_SYMBOL_GPL(hash_digest_size); 58EXPORT_SYMBOL_GPL(hash_digest_size);