[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221006130837.17587-4-pankaj.gupta@nxp.com>
Date: Thu, 6 Oct 2022 18:38:32 +0530
From: Pankaj Gupta <pankaj.gupta@....com>
To: jarkko@...nel.org, a.fatoum@...gutronix.de, gilad@...yossef.com,
Jason@...c4.com, jejb@...ux.ibm.com, zohar@...ux.ibm.com,
dhowells@...hat.com, sumit.garg@...aro.org, david@...ma-star.at,
michael@...le.cc, john.ernberg@...ia.se, jmorris@...ei.org,
serge@...lyn.com, herbert@...dor.apana.org.au, davem@...emloft.net,
j.luebbe@...gutronix.de, ebiggers@...nel.org, richard@....at,
keyrings@...r.kernel.org, linux-crypto@...r.kernel.org,
linux-integrity@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, sahil.malhotra@....com,
kshitiz.varshney@....com, horia.geanta@....com, V.Sethi@....com
Cc: Pankaj Gupta <pankaj.gupta@....com>
Subject: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
Consumer of the kernel crypto api, after allocating
the transformation (tfm), sets the:
- flag 'is_hbk'
- structure 'struct hw_bound_key_info hbk_info'
based on the type of key, the consumer is using.
This helps:
- This helps to influence the core processing logic
for the encapsulated algorithm.
- This flag is set by the consumer after allocating
the tfm and before calling the function crypto_xxx_setkey().
Signed-off-by: Pankaj Gupta <pankaj.gupta@....com>
---
include/linux/crypto.h | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/include/linux/crypto.h b/include/linux/crypto.h
index 2324ab6f1846..cd476f8a1cb4 100644
--- a/include/linux/crypto.h
+++ b/include/linux/crypto.h
@@ -19,6 +19,7 @@
#include <linux/refcount.h>
#include <linux/slab.h>
#include <linux/completion.h>
+#include <linux/hw_bound_key.h>
/*
* Autoloaded crypto modules should only use a prefixed name to avoid allowing
@@ -639,6 +640,10 @@ struct crypto_tfm {
u32 crt_flags;
+ unsigned int is_hbk;
+
+ struct hw_bound_key_info hbk_info;
+
int node;
void (*exit)(struct crypto_tfm *tfm);
--
2.17.1
Powered by blists - more mailing lists