search for: max_cipher_key_len

Displaying 20 results from an estimated 37 matches for "max_cipher_key_len".

2020 Aug 05
0
[PATCH v3 32/38] virtio_crypto: convert to LE accessors
...*vdev) if (!vcrypto) return -ENOMEM; - virtio_cread(vdev, struct virtio_crypto_config, + virtio_cread_le(vdev, struct virtio_crypto_config, max_dataqueues, &max_data_queues); if (max_data_queues < 1) max_data_queues = 1; - virtio_cread(vdev, struct virtio_crypto_config, - max_cipher_key_len, &max_cipher_key_len); - virtio_cread(vdev, struct virtio_crypto_config, - max_auth_key_len, &max_auth_key_len); - virtio_cread(vdev, struct virtio_crypto_config, - max_size, &max_size); - virtio_cread(vdev, struct virtio_crypto_config, - crypto_services, &crypto_services); - vir...
2020 Aug 03
0
[PATCH v2 08/24] virtio_crypto: correct tags for config space fields
...- __u32 cipher_algo_l; - __u32 cipher_algo_h; - __u32 hash_algo; - __u32 mac_algo_l; - __u32 mac_algo_h; - __u32 aead_algo; + __le32 cipher_algo_l; + __le32 cipher_algo_h; + __le32 hash_algo; + __le32 mac_algo_l; + __le32 mac_algo_h; + __le32 aead_algo; /* Maximum length of cipher key */ - __u32 max_cipher_key_len; + __le32 max_cipher_key_len; /* Maximum length of authenticated key */ - __u32 max_auth_key_len; - __u32 reserve; + __le32 max_auth_key_len; + __le32 reserve; /* Maximum size of each crypto request's content */ - __u64 max_size; + __le64 max_size; }; struct virtio_crypto_inhdr { -- MS...
2020 Aug 05
0
[PATCH v3 08/38] virtio_crypto: correct tags for config space fields
...- __u32 cipher_algo_l; - __u32 cipher_algo_h; - __u32 hash_algo; - __u32 mac_algo_l; - __u32 mac_algo_h; - __u32 aead_algo; + __le32 cipher_algo_l; + __le32 cipher_algo_h; + __le32 hash_algo; + __le32 mac_algo_l; + __le32 mac_algo_h; + __le32 aead_algo; /* Maximum length of cipher key */ - __u32 max_cipher_key_len; + __le32 max_cipher_key_len; /* Maximum length of authenticated key */ - __u32 max_auth_key_len; - __u32 reserve; + __le32 max_auth_key_len; + __le32 reserve; /* Maximum size of each crypto request's content */ - __u64 max_size; + __le64 max_size; }; struct virtio_crypto_inhdr { -- MS...
2016 Nov 28
0
[PATCH v3] crypto: add virtio-crypto driver
..._device *vdev = vcrypto->vdev; + + virtcrypto_clean_affinity(vcrypto, -1); + + vdev->config->del_vqs(vdev); + + virtcrypto_free_queues(vcrypto); +} + +static int virtcrypto_probe(struct virtio_device *vdev) +{ + int err = -EFAULT; + struct virtio_crypto *vcrypto; + u32 max_data_queues = 0, max_cipher_key_len = 0; + u32 max_auth_key_len = 0; + u64 max_size = 0; + + if (!virtio_has_feature(vdev, VIRTIO_F_VERSION_1)) + return -ENODEV; + + if (!vdev->config->get) { + dev_err(&vdev->dev, "%s failure: config access disabled\n", + __func__); + return -EINVAL; + } + + if (num_possib...
2016 Nov 29
0
[PATCH v4 1/1] crypto: add virtio-crypto driver
...crypto->ctrl_lock); + + return 0; +} + +static int virtio_crypto_alg_ablkcipher_init_sessions( + struct virtio_crypto_ablkcipher_ctx *ctx, + const uint8_t *key, unsigned int keylen) +{ + uint32_t alg; + int ret; + struct virtio_crypto *vcrypto = ctx->vcrypto; + + if (keylen > vcrypto->max_cipher_key_len) { + pr_err("virtio_crypto: the key is too long\n"); + goto bad_key; + } + + if (virtio_crypto_alg_validate_key(keylen, &alg)) + goto bad_key; + + /* Create encryption session */ + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, + alg, key, keylen, 1); + if (ret) + return r...
2016 Nov 28
5
[PATCH v3] crypto: add virtio-crypto driver
...affinity(vcrypto, -1); > + > + vdev->config->del_vqs(vdev); > + > + virtcrypto_free_queues(vcrypto); > +} > + > +static int virtcrypto_probe(struct virtio_device *vdev) > +{ > + int err = -EFAULT; > + struct virtio_crypto *vcrypto; > + u32 max_data_queues = 0, max_cipher_key_len = 0; > + u32 max_auth_key_len = 0; > + u64 max_size = 0; > + > + if (!virtio_has_feature(vdev, VIRTIO_F_VERSION_1)) > + return -ENODEV; > + > + if (!vdev->config->get) { > + dev_err(&vdev->dev, "%s failure: config access disabled\n", > + __func_...
2016 Nov 28
5
[PATCH v3] crypto: add virtio-crypto driver
...affinity(vcrypto, -1); > + > + vdev->config->del_vqs(vdev); > + > + virtcrypto_free_queues(vcrypto); > +} > + > +static int virtcrypto_probe(struct virtio_device *vdev) > +{ > + int err = -EFAULT; > + struct virtio_crypto *vcrypto; > + u32 max_data_queues = 0, max_cipher_key_len = 0; > + u32 max_auth_key_len = 0; > + u64 max_size = 0; > + > + if (!virtio_has_feature(vdev, VIRTIO_F_VERSION_1)) > + return -ENODEV; > + > + if (!vdev->config->get) { > + dev_err(&vdev->dev, "%s failure: config access disabled\n", > + __func_...
2016 Dec 01
0
[PATCH v5 1/1] crypto: add virtio-crypto driver
...crypto->ctrl_lock); + + return 0; +} + +static int virtio_crypto_alg_ablkcipher_init_sessions( + struct virtio_crypto_ablkcipher_ctx *ctx, + const uint8_t *key, unsigned int keylen) +{ + uint32_t alg; + int ret; + struct virtio_crypto *vcrypto = ctx->vcrypto; + + if (keylen > vcrypto->max_cipher_key_len) { + pr_err("virtio_crypto: the key is too long\n"); + goto bad_key; + } + + if (virtio_crypto_alg_validate_key(keylen, &alg)) + goto bad_key; + + /* Create encryption session */ + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, + alg, key, keylen, 1); + if (ret) + return r...
2016 Dec 08
0
[PATCH v6 2/2] crypto: add virtio-crypto driver
...crypto->ctrl_lock); + + return 0; +} + +static int virtio_crypto_alg_ablkcipher_init_sessions( + struct virtio_crypto_ablkcipher_ctx *ctx, + const uint8_t *key, unsigned int keylen) +{ + uint32_t alg; + int ret; + struct virtio_crypto *vcrypto = ctx->vcrypto; + + if (keylen > vcrypto->max_cipher_key_len) { + pr_err("virtio_crypto: the key is too long\n"); + goto bad_key; + } + + if (virtio_crypto_alg_validate_key(keylen, &alg)) + goto bad_key; + + /* Create encryption session */ + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, + alg, key, keylen, 1); + if (ret) + return r...
2016 Dec 14
0
[PATCH v7 1/1] crypto: add virtio-crypto driver
...crypto->ctrl_lock); + + return 0; +} + +static int virtio_crypto_alg_ablkcipher_init_sessions( + struct virtio_crypto_ablkcipher_ctx *ctx, + const uint8_t *key, unsigned int keylen) +{ + uint32_t alg; + int ret; + struct virtio_crypto *vcrypto = ctx->vcrypto; + + if (keylen > vcrypto->max_cipher_key_len) { + pr_err("virtio_crypto: the key is too long\n"); + goto bad_key; + } + + if (virtio_crypto_alg_validate_key(keylen, &alg)) + goto bad_key; + + /* Create encryption session */ + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, + alg, key, keylen, 1); + if (ret) + return r...
2016 Dec 15
0
[PATCH v8 1/1] crypto: add virtio-crypto driver
...crypto->ctrl_lock); + + return 0; +} + +static int virtio_crypto_alg_ablkcipher_init_sessions( + struct virtio_crypto_ablkcipher_ctx *ctx, + const uint8_t *key, unsigned int keylen) +{ + uint32_t alg; + int ret; + struct virtio_crypto *vcrypto = ctx->vcrypto; + + if (keylen > vcrypto->max_cipher_key_len) { + pr_err("virtio_crypto: the key is too long\n"); + goto bad_key; + } + + if (virtio_crypto_alg_validate_key(keylen, &alg)) + goto bad_key; + + /* Create encryption session */ + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, + alg, key, keylen, 1); + if (ret) + return r...
2016 Nov 28
4
[PATCH v3] virtio-crypto: add Linux driver
v3: - set cpu affinity when data queues are not equal to the number of online cpus. [Michael] - add TODO comments for cpu hotplug (changing the relationship of binding virtqueue and cpu) - use __u32/64 in the config space since the virtio->get() doesn't support byte-swap yet. [Michael] - drop the whole patch 1 of v2 because the above reason. - add VERSION_1 check at the beginning of
2016 Nov 28
4
[PATCH v3] virtio-crypto: add Linux driver
v3: - set cpu affinity when data queues are not equal to the number of online cpus. [Michael] - add TODO comments for cpu hotplug (changing the relationship of binding virtqueue and cpu) - use __u32/64 in the config space since the virtio->get() doesn't support byte-swap yet. [Michael] - drop the whole patch 1 of v2 because the above reason. - add VERSION_1 check at the beginning of
2016 Dec 08
4
[PATCH v6 0/2] virtio-crypto: add Linux driver
v6: - add patch 1/2 to make sparc architecture happy. [Sam] - close created sessions previousely when rekeying. - convert the priority of virtio crypto algs from 4001 to 501 which is enough. v5: - add comments for algs_lock and table_lock. [Stefan] - use kzfree instead of kfree for key material security. [Stefan] - drop unnecessary spin_lock for struct virtio_crypto_ablkcipher_ctx. -
2016 Dec 08
4
[PATCH v6 0/2] virtio-crypto: add Linux driver
v6: - add patch 1/2 to make sparc architecture happy. [Sam] - close created sessions previousely when rekeying. - convert the priority of virtio crypto algs from 4001 to 501 which is enough. v5: - add comments for algs_lock and table_lock. [Stefan] - use kzfree instead of kfree for key material security. [Stefan] - drop unnecessary spin_lock for struct virtio_crypto_ablkcipher_ctx. -
2016 Nov 28
0
[PATCH v3] crypto: add virtio-crypto driver
...;config->del_vqs(vdev); > > + > > + virtcrypto_free_queues(vcrypto); > > +} > > + > > +static int virtcrypto_probe(struct virtio_device *vdev) > > +{ > > + int err = -EFAULT; > > + struct virtio_crypto *vcrypto; > > + u32 max_data_queues = 0, max_cipher_key_len = 0; > > + u32 max_auth_key_len = 0; > > + u64 max_size = 0; > > + > > + if (!virtio_has_feature(vdev, VIRTIO_F_VERSION_1)) > > + return -ENODEV; > > + > > + if (!vdev->config->get) { > > + dev_err(&vdev->dev, "%s failure: config a...
2016 Dec 06
2
[PATCH v5 1/1] crypto: add virtio-crypto driver
...; +static int virtio_crypto_alg_ablkcipher_init_sessions( > + struct virtio_crypto_ablkcipher_ctx *ctx, > + const uint8_t *key, unsigned int keylen) > +{ > + uint32_t alg; > + int ret; > + struct virtio_crypto *vcrypto = ctx->vcrypto; > + > + if (keylen > vcrypto->max_cipher_key_len) { > + pr_err("virtio_crypto: the key is too long\n"); > + goto bad_key; > + } > + > + if (virtio_crypto_alg_validate_key(keylen, &alg)) > + goto bad_key; > + > + /* Create encryption session */ > + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, &gt...
2016 Dec 06
2
[PATCH v5 1/1] crypto: add virtio-crypto driver
...; +static int virtio_crypto_alg_ablkcipher_init_sessions( > + struct virtio_crypto_ablkcipher_ctx *ctx, > + const uint8_t *key, unsigned int keylen) > +{ > + uint32_t alg; > + int ret; > + struct virtio_crypto *vcrypto = ctx->vcrypto; > + > + if (keylen > vcrypto->max_cipher_key_len) { > + pr_err("virtio_crypto: the key is too long\n"); > + goto bad_key; > + } > + > + if (virtio_crypto_alg_validate_key(keylen, &alg)) > + goto bad_key; > + > + /* Create encryption session */ > + ret = virtio_crypto_alg_ablkcipher_init_session(ctx, &gt...
2016 Dec 01
3
[PATCH v5 0/1] virtio-crypto: add Linux driver
v5: - add comments for algs_lock and table_lock. [Stefan] - use kzfree instead of kfree for key material security. [Stefan] - drop unnecessary spin_lock for struct virtio_crypto_ablkcipher_ctx. - dynamically allocated memory for iv in order to avoid to do DMA from the stack memory in __virtio_crypto_ablkcipher_do_req(). - add logs for error path in virtio_crypto_alg_validate_key(). - add
2016 Dec 01
3
[PATCH v5 0/1] virtio-crypto: add Linux driver
v5: - add comments for algs_lock and table_lock. [Stefan] - use kzfree instead of kfree for key material security. [Stefan] - drop unnecessary spin_lock for struct virtio_crypto_ablkcipher_ctx. - dynamically allocated memory for iv in order to avoid to do DMA from the stack memory in __virtio_crypto_ablkcipher_do_req(). - add logs for error path in virtio_crypto_alg_validate_key(). - add