Forum | Documentation | Website | Blog

Skip to content
Snippets Groups Projects
  1. Jan 16, 2020
    • Jason A. Donenfeld's avatar
      crypto: poly1305 - add new 32 and 64-bit generic versions · 1c08a104
      Jason A. Donenfeld authored
      These two C implementations from Zinc -- a 32x32 one and a 64x64 one,
      depending on the platform -- come from Andrew Moon's public domain
      poly1305-donna portable code, modified for usage in the kernel. The
      precomputation in the 32-bit version and the use of 64x64 multiplies in
      the 64-bit version make these perform better than the code it replaces.
      Moon's code is also very widespread and has received many eyeballs of
      scrutiny.
      
      There's a bit of interference between the x86 implementation, which
      relies on internal details of the old scalar implementation. In the next
      commit, the x86 implementation will be replaced with a faster one that
      doesn't rely on this, so none of this matters much. But for now, to keep
      this passing the tests, we inline the bits of the old implementation
      that the x86 implementation relied on. Also, since we now support a
      slightly larger key space, via the union, some offsets had to be fixed
      up.
      
      Nonce calculation was folded in wi...
      1c08a104
  2. Nov 16, 2019
  3. Apr 18, 2019
    • Eric Biggers's avatar
      crypto: run initcalls for generic implementations earlier · c4741b23
      Eric Biggers authored
      
      Use subsys_initcall for registration of all templates and generic
      algorithm implementations, rather than module_init.  Then change
      cryptomgr to use arch_initcall, to place it before the subsys_initcalls.
      
      This is needed so that when both a generic and optimized implementation
      of an algorithm are built into the kernel (not loadable modules), the
      generic implementation is registered before the optimized one.
      Otherwise, the self-tests for the optimized implementation are unable to
      allocate the generic implementation for the new comparison fuzz tests.
      
      Note that on arm, a side effect of this change is that self-tests for
      generic implementations may run before the unaligned access handler has
      been installed.  So, unaligned accesses will crash the kernel.  This is
      arguably a good thing as it makes it easier to detect that type of bug.
      
      Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      c4741b23
  4. Nov 20, 2018
  5. Jul 08, 2018
  6. Jan 12, 2018
    • Eric Biggers's avatar
      crypto: poly1305 - remove ->setkey() method · a16e772e
      Eric Biggers authored
      
      Since Poly1305 requires a nonce per invocation, the Linux kernel
      implementations of Poly1305 don't use the crypto API's keying mechanism
      and instead expect the key and nonce as the first 32 bytes of the data.
      But ->setkey() is still defined as a stub returning an error code.  This
      prevents Poly1305 from being used through AF_ALG and will also break it
      completely once we start enforcing that all crypto API users (not just
      AF_ALG) call ->setkey() if present.
      
      Fix it by removing crypto_poly1305_setkey(), leaving ->setkey as NULL.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      a16e772e
  7. Jan 05, 2018
  8. Nov 13, 2016
  9. Jul 17, 2015
  10. Jun 17, 2015
  11. Jun 04, 2015