Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto update from Herbert Xu:
"Here is the crypto update for 4.2:
API:
- Convert RNG interface to new style.
- New AEAD interface with one SG list for AD and plain/cipher text.
All external AEAD users have been converted.
- New asymmetric key interface (akcipher).
Algorithms:
- Chacha20, Poly1305 and RFC7539 support.
- New RSA implementation.
- Jitter RNG.
- DRBG is now seeded with both /dev/random and Jitter RNG. If kernel
pool isn't ready then DRBG will be reseeded when it is.
- DRBG is now the default crypto API RNG, replacing krng.
- 842 compression (previously part of powerpc nx driver).
Drivers:
- Accelerated SHA-512 for arm64.
- New Marvell CESA driver that supports DMA and more algorithms.
- Updated powerpc nx 842 support.
- Added support for SEC1 hardware to talitos"
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (292 commits)
crypto: marvell/cesa - remove COMPILE_TEST dependency
crypto: algif_aead - Temporarily disable all AEAD algorithms
crypto: af_alg - Forbid the use internal algorithms
crypto: echainiv - Only hold RNG during initialisation
crypto: seqiv - Add compatibility support without RNG
crypto: eseqiv - Offer normal cipher functionality without RNG
crypto: chainiv - Offer normal cipher functionality without RNG
crypto: user - Add CRYPTO_MSG_DELRNG
crypto: user - Move cryptouser.h to uapi
crypto: rng - Do not free default RNG when it becomes unused
crypto: skcipher - Allow givencrypt to be NULL
crypto: sahara - propagate the error on clk_disable_unprepare() failure
crypto: rsa - fix invalid select for AKCIPHER
crypto: picoxcell - Update to the current clk API
crypto: nx - Check for bogus firmware properties
crypto: marvell/cesa - add DT bindings documentation
crypto: marvell/cesa - add support for Kirkwood and Dove SoCs
crypto: marvell/cesa - add support for Orion SoCs
crypto: marvell/cesa - add allhwsupport module parameter
crypto: marvell/cesa - add support for all armada SoCs
...
This commit is contained in:
@@ -17,8 +17,9 @@
|
||||
#include <linux/err.h>
|
||||
#include <linux/bug.h>
|
||||
#include <linux/completion.h>
|
||||
#include <linux/crypto.h>
|
||||
#include <linux/ieee802154.h>
|
||||
#include <crypto/algapi.h>
|
||||
#include <crypto/aead.h>
|
||||
|
||||
#include "ieee802154_i.h"
|
||||
#include "llsec.h"
|
||||
@@ -649,7 +650,7 @@ llsec_do_encrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec,
|
||||
u8 iv[16];
|
||||
unsigned char *data;
|
||||
int authlen, assoclen, datalen, rc;
|
||||
struct scatterlist src, assoc[2], dst[2];
|
||||
struct scatterlist sg;
|
||||
struct aead_request *req;
|
||||
|
||||
authlen = ieee802154_sechdr_authtag_len(&hdr->sec);
|
||||
@@ -659,30 +660,23 @@ llsec_do_encrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec,
|
||||
if (!req)
|
||||
return -ENOMEM;
|
||||
|
||||
sg_init_table(assoc, 2);
|
||||
sg_set_buf(&assoc[0], skb_mac_header(skb), skb->mac_len);
|
||||
assoclen = skb->mac_len;
|
||||
|
||||
data = skb_mac_header(skb) + skb->mac_len;
|
||||
datalen = skb_tail_pointer(skb) - data;
|
||||
|
||||
if (hdr->sec.level & IEEE802154_SCF_SECLEVEL_ENC) {
|
||||
sg_set_buf(&assoc[1], data, 0);
|
||||
} else {
|
||||
sg_set_buf(&assoc[1], data, datalen);
|
||||
skb_put(skb, authlen);
|
||||
|
||||
sg_init_one(&sg, skb_mac_header(skb), assoclen + datalen + authlen);
|
||||
|
||||
if (!(hdr->sec.level & IEEE802154_SCF_SECLEVEL_ENC)) {
|
||||
assoclen += datalen;
|
||||
datalen = 0;
|
||||
}
|
||||
|
||||
sg_init_one(&src, data, datalen);
|
||||
|
||||
sg_init_table(dst, 2);
|
||||
sg_set_buf(&dst[0], data, datalen);
|
||||
sg_set_buf(&dst[1], skb_put(skb, authlen), authlen);
|
||||
|
||||
aead_request_set_callback(req, 0, NULL, NULL);
|
||||
aead_request_set_assoc(req, assoc, assoclen);
|
||||
aead_request_set_crypt(req, &src, dst, datalen, iv);
|
||||
aead_request_set_crypt(req, &sg, &sg, datalen, iv);
|
||||
aead_request_set_ad(req, assoclen);
|
||||
|
||||
rc = crypto_aead_encrypt(req);
|
||||
|
||||
@@ -858,7 +852,7 @@ llsec_do_decrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec,
|
||||
u8 iv[16];
|
||||
unsigned char *data;
|
||||
int authlen, datalen, assoclen, rc;
|
||||
struct scatterlist src, assoc[2];
|
||||
struct scatterlist sg;
|
||||
struct aead_request *req;
|
||||
|
||||
authlen = ieee802154_sechdr_authtag_len(&hdr->sec);
|
||||
@@ -868,27 +862,21 @@ llsec_do_decrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec,
|
||||
if (!req)
|
||||
return -ENOMEM;
|
||||
|
||||
sg_init_table(assoc, 2);
|
||||
sg_set_buf(&assoc[0], skb_mac_header(skb), skb->mac_len);
|
||||
assoclen = skb->mac_len;
|
||||
|
||||
data = skb_mac_header(skb) + skb->mac_len;
|
||||
datalen = skb_tail_pointer(skb) - data;
|
||||
|
||||
if (hdr->sec.level & IEEE802154_SCF_SECLEVEL_ENC) {
|
||||
sg_set_buf(&assoc[1], data, 0);
|
||||
} else {
|
||||
sg_set_buf(&assoc[1], data, datalen - authlen);
|
||||
sg_init_one(&sg, skb_mac_header(skb), assoclen + datalen);
|
||||
|
||||
if (!(hdr->sec.level & IEEE802154_SCF_SECLEVEL_ENC)) {
|
||||
assoclen += datalen - authlen;
|
||||
data += datalen - authlen;
|
||||
datalen = authlen;
|
||||
}
|
||||
|
||||
sg_init_one(&src, data, datalen);
|
||||
|
||||
aead_request_set_callback(req, 0, NULL, NULL);
|
||||
aead_request_set_assoc(req, assoc, assoclen);
|
||||
aead_request_set_crypt(req, &src, &src, datalen, iv);
|
||||
aead_request_set_crypt(req, &sg, &sg, datalen, iv);
|
||||
aead_request_set_ad(req, assoclen);
|
||||
|
||||
rc = crypto_aead_decrypt(req);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user