<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git/drivers/crypto/caam, branch v3.15.2</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v3.15.2</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v3.15.2'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2014-04-28T10:17:18+00:00</updated>
<entry>
<title>crypto: caam - add allocation failure handling in SPRINTFCAT macro</title>
<updated>2014-04-28T10:17:18+00:00</updated>
<author>
<name>Horia Geanta</name>
<email>horia.geanta@freescale.com</email>
</author>
<published>2014-04-18T10:01:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=27c5fb7a84242b66bf1e0b2fe6bf40d19bcc5c04'/>
<id>urn:sha1:27c5fb7a84242b66bf1e0b2fe6bf40d19bcc5c04</id>
<content type='text'>
GFP_ATOMIC memory allocation could fail.
In this case, avoid NULL pointer dereference and notify user.

Cc: &lt;stable@vger.kernel.org&gt; # 3.2+
Cc: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - add missing key_dma unmap</title>
<updated>2014-03-21T13:54:28+00:00</updated>
<author>
<name>Horia Geanta</name>
<email>horia.geanta@freescale.com</email>
</author>
<published>2014-03-14T15:48:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=ec31eed754e2fd43938e72ef9e1b60aa55ccb417'/>
<id>urn:sha1:ec31eed754e2fd43938e72ef9e1b60aa55ccb417</id>
<content type='text'>
(struct caam_ctx) ctx-&gt;key_dma needs to be unmapped
when context is cleaned up.

Signed-off-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - add support for aead null encryption</title>
<updated>2014-03-21T13:54:27+00:00</updated>
<author>
<name>Horia Geanta</name>
<email>horia.geanta@freescale.com</email>
</author>
<published>2014-03-14T15:46:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=ae4a825ffdd6fd769af2667e03070940af1b8368'/>
<id>urn:sha1:ae4a825ffdd6fd769af2667e03070940af1b8368</id>
<content type='text'>
Add support for the following combinations:
-encryption: null
-authentication: md5, sha* (1, 224, 256, 384, 512)

Signed-off-by: Tudor Ambarus &lt;tudor.ambarus@freescale.com&gt;
Signed-off-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - remove error propagation handling</title>
<updated>2014-03-21T13:54:24+00:00</updated>
<author>
<name>Horia Geanta</name>
<email>horia.geanta@freescale.com</email>
</author>
<published>2014-03-14T15:46:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=4464a7d4f53d756101291da26563f37f7fce40f3'/>
<id>urn:sha1:4464a7d4f53d756101291da26563f37f7fce40f3</id>
<content type='text'>
Commit 61bb86bba169507a5f223b94b9176c32c84b4721
("crypto: caam - set descriptor sharing type to SERIAL")
changed the descriptor sharing mode from SHARE_WAIT to SHARE_SERIAL.

All descriptor commands that handle the "ok to share" and
"error propagation" settings should also go away, since they have no
meaning for SHARE_SERIAL.

Signed-off-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - Fix first parameter to caam_init_rng</title>
<updated>2014-03-21T13:32:54+00:00</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2014-03-21T13:32:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=85e0da925b2ddbf39a6cefb4e02ad51d0a0912c0'/>
<id>urn:sha1:85e0da925b2ddbf39a6cefb4e02ad51d0a0912c0</id>
<content type='text'>
Found by the kbuild test robot, the first argument to caam_init_rng
has a spurious ampersand.

Reported-by: kbuild test robot &lt;fengguang.wu@intel.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - Dynamic memory allocation for caam_rng_ctx object</title>
<updated>2014-03-10T12:17:12+00:00</updated>
<author>
<name>Nitesh Lal</name>
<email>NiteshNarayanLal@freescale.com</email>
</author>
<published>2014-03-07T10:36:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=6e4e603a9a99c6e27a74c1a813a7c751d85a721d'/>
<id>urn:sha1:6e4e603a9a99c6e27a74c1a813a7c751d85a721d</id>
<content type='text'>
This patch allocates memory from DMAable region to the caam_rng_ctx object,
earlier it had been statically allocated which resulted in errorneous
behaviour on inserting the caamrng module at the runtime.

Signed-off-by: Nitesh Lal &lt;NiteshNarayanLal@freescale.com&gt;
Acked-by: Ruchika Gupta &lt;ruchika.gupta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - writel() arguments are swapped</title>
<updated>2014-02-26T21:56:59+00:00</updated>
<author>
<name>Dan Carpenter</name>
<email>dan.carpenter@oracle.com</email>
</author>
<published>2014-02-21T08:51:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=f829e7a32c9434e31e565bc79f5804a7a984c10f'/>
<id>urn:sha1:f829e7a32c9434e31e565bc79f5804a7a984c10f</id>
<content type='text'>
My guess is that this little endian configuration is never found in real
life, but if it were then the writel() arguments are in the wrong order
so the driver would crash immediately.

Signed-off-by: Dan Carpenter &lt;dan.carpenter@oracle.com&gt;
Acked-by: Kim Phillips &lt;kim.phillips@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - fix ERA retrieval function</title>
<updated>2014-02-09T01:59:27+00:00</updated>
<author>
<name>Alex Porosanu</name>
<email>alexandru.porosanu@freescale.com</email>
</author>
<published>2014-02-06T08:27:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=883619a931e9f54fca7495321b339669f11cc727'/>
<id>urn:sha1:883619a931e9f54fca7495321b339669f11cc727</id>
<content type='text'>
SEC ERA has to be retrieved by reading the "fsl,sec-era" property
from the device tree. This property is updated/filled in by
u-boot.

Signed-off-by: Alex Porosanu &lt;alexandru.porosanu@freescale.com&gt;
Reviewed-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - Fix job ring discovery in controller driver</title>
<updated>2014-02-09T01:59:13+00:00</updated>
<author>
<name>Nitesh Lal</name>
<email>NiteshNarayanLal@freescale.com</email>
</author>
<published>2014-02-09T01:59:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=0a63b09dd6e321d4488347d6283685d08ee4bb7f'/>
<id>urn:sha1:0a63b09dd6e321d4488347d6283685d08ee4bb7f</id>
<content type='text'>
The SEC Controller driver creates platform devices for it's child job ring nodes.
Currently the driver uses for_each_compatible routine which traverses
the whole device tree to create the job rings for the platform device.
The patch changes this to search for the compatible property of job ring
only in the child nodes i.e., the job rings are created as per the number
of children associated with the crypto node.

Signed-off-by: Nitesh Lal &lt;NiteshNarayanLal@freescale.com&gt;
Reviewed-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: caam - simplify and harden key parsing</title>
<updated>2013-12-20T12:06:27+00:00</updated>
<author>
<name>Horia Geanta</name>
<email>horia.geanta@freescale.com</email>
</author>
<published>2013-12-19T15:27:35+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=4e6e0b272d5af0c9c4f4215248130e58d68bcf0f'/>
<id>urn:sha1:4e6e0b272d5af0c9c4f4215248130e58d68bcf0f</id>
<content type='text'>
Use the common helper function crypto_authenc_extractkeys() for key
parsing.
Also fix the key buffer overflow condition: use split key pad length
instead of authentication key length.

Signed-off-by: Horia Geanta &lt;horia.geanta@freescale.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
