lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110113014414.GA12888@gondor.apana.org.au>
Date:	Thu, 13 Jan 2011 12:44:15 +1100
From:	Herbert Xu <herbert@...dor.apana.org.au>
To:	Linus Torvalds <torvalds@...ux-foundation.org>,
	"David S. Miller" <davem@...emloft.net>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Linux Crypto Mailing List <linux-crypto@...r.kernel.org>
Subject: Re: Crypto Update for 2.6.38

Hi Linus:

Here is an updated to the crypto pull request for 2.6.38:

* Crypto API interface for user-space (hash + skcipher)

	This interface is intended to provide access of kernel
	hardware crypto drivers to user-space applications.  It
	presents the kernel crypto API via a socket interface.

	It is only meant to be used for bulk crypto operations,
	i.e., if you're doing less than a page's worth of data,
	then this is not for you.

	For bulk data processing the performance is similar to
	that in the kernel when zero-copy is used in both
	directions.

* Memory corruption fix for via_rng.
* Fixes for new OMAP driver.
* 32-bit support in aesni-intel.
* GCM support in aesni-intel.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian Hoban (1):
      crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors

Adrian-Ken Rueegsegger (1):
      crypto: ripemd - Set module author and update email address

Dennis Gilmore (1):
      crypto: n2 - use __devexit not __exit in n2_unregister_algs

Dmitry Kasatkin (15):
      crypto: omap-sham - uses digest buffer in request context
      crypto: omap-sham - DMA initialization fixes for off mode
      crypto: omap-sham - error handling improved
      crypto: omap-sham - removed redundunt locking
      crypto: omap-sham - crypto_ahash_final() now not need to be called.
      crypto: omap-sham - hash-in-progress is stored in hw format
      crypto: omap-sham - FLAGS_FIRST is redundant and removed
      crypto: omap-sham - zero-copy scatterlist handling
      crypto: omap-aes - DMA initialization fixes for OMAP off mode
      crypto: omap-aes - redundant locking is removed
      crypto: omap-aes - error handling implementation improved
      crypto: omap-aes - unnecessary code removed
      crypto: omap-aes - initialize aes module once per request
      crypto: omap-aes - checkpatch --file warning fixes
      crypto: omap-sham - backlog handling fix

Herbert Xu (13):
      crypto: hash - Fix async import on shash algorithm
      net - Add AF_ALG macros
      crypto: af_alg - User-space interface for Crypto API
      crypto: algif_hash - User-space interface for hash operations
      crypto: algif_skcipher - User-space interface for skcipher operations
      crypto: algif_skcipher - Pass on error from af_alg_make_sg
      crypto: af_alg - Add dependency on NET
      crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned
      crypto: algif_skcipher - Handle unaligned receive buffer
      crypto: gf128mul - Remove experimental tag
      hwrng: via_rng - Fix asm constraints
      crypto: padlock - Move padlock.h into include/crypto
      hwrng: via_rng - Fix memory scribbling on some CPUs

Joe Perches (1):
      crypto: Use vzalloc

Mathias Krause (2):
      crypto: aesni-intel - Ported implementation to x86-32
      crypto: aesni-intel - Fixed build error on x86-32

Miloslav Trmač (3):
      include: Install linux/if_alg.h for user-space crypto API
      net: Add missing lockdep class names for af_alg
      crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets

Nicolas Kaiser (1):
      crypto: cast5 - simplify if-statements

Randy Dunlap (1):
      crypto: af_alg - fix af_alg memory_allocated data type

Roel Kluin (1):
      crypto: mv_cesa - dont return PTR_ERR() of wrong pointer

Steffen Klassert (2):
      crypto: scatterwalk - Add scatterwalk_crypto_chain helper
      crypto: Use scatterwalk_crypto_chain

Tadeusz Struk (2):
      crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions
      crypto: aesni-intel - Fixed build with binutils 2.16

Tejun Heo (1):
      crypto: mark crypto workqueues CPU_INTENSIVE

Tracey Dent (1):
      crypto: Makefile clean up

 arch/x86/crypto/aesni-intel_asm.S     | 1832 ++++++++++++++++++++++++++++++++-
 arch/x86/crypto/aesni-intel_glue.c    |  540 ++++++++++-
 crypto/Kconfig                        |   34 +-
 crypto/Makefile                       |   17 +-
 crypto/af_alg.c                       |  483 +++++++++
 crypto/algif_hash.c                   |  319 ++++++
 crypto/algif_skcipher.c               |  632 ++++++++++++
 crypto/authenc.c                      |   22 +-
 crypto/cast5.c                        |   74 +-
 crypto/crypto_wq.c                    |    3 +-
 crypto/deflate.c                      |    3 +-
 crypto/eseqiv.c                       |   18 +-
 crypto/gcm.c                          |   19 +-
 crypto/pcrypt.c                       |    3 +-
 crypto/rmd128.c                       |    3 +-
 crypto/rmd160.c                       |    3 +-
 crypto/rmd256.c                       |    3 +-
 crypto/rmd320.c                       |    3 +-
 crypto/shash.c                        |    8 +-
 crypto/tcrypt.c                       |   11 +
 crypto/testmgr.c                      |   24 +
 crypto/testmgr.h                      |  361 +++++++
 crypto/zlib.c                         |    3 +-
 drivers/char/hw_random/via-rng.c      |   10 +-
 drivers/crypto/mv_cesa.c              |    2 +-
 drivers/crypto/n2_core.c              |    2 +-
 drivers/crypto/omap-aes.c             |  260 +++---
 drivers/crypto/omap-sham.c            |  374 ++++---
 drivers/crypto/padlock-aes.c          |    2 +-
 drivers/crypto/padlock-sha.c          |    8 +-
 include/crypto/if_alg.h               |   92 ++
 {drivers => include}/crypto/padlock.h |    8 +-
 include/crypto/scatterwalk.h          |   15 +
 include/linux/Kbuild                  |    1 +
 include/linux/if_alg.h                |   40 +
 include/linux/socket.h                |    5 +-
 net/core/sock.c                       |    6 +-
 37 files changed, 4779 insertions(+), 464 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@...dor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ