[PATCH v0 3/8] crypto: hbk flags & info added to the tfm
Pankaj Gupta
pankaj.gupta at nxp.com
Thu Oct 6 13:08:32 UTC 2022
Consumer of the kernel crypto api, after allocating
the transformation (tfm), sets the:
- flag 'is_hbk'
- structure 'struct hw_bound_key_info hbk_info'
based on the type of key, the consumer is using.
This helps:
- This helps to influence the core processing logic
for the encapsulated algorithm.
- This flag is set by the consumer after allocating
the tfm and before calling the function crypto_xxx_setkey().
Signed-off-by: Pankaj Gupta <pankaj.gupta at nxp.com>
---
include/linux/crypto.h | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/include/linux/crypto.h b/include/linux/crypto.h
index 2324ab6f1846..cd476f8a1cb4 100644
--- a/include/linux/crypto.h
+++ b/include/linux/crypto.h
@@ -19,6 +19,7 @@
#include <linux/refcount.h>
#include <linux/slab.h>
#include <linux/completion.h>
+#include <linux/hw_bound_key.h>
/*
* Autoloaded crypto modules should only use a prefixed name to avoid allowing
@@ -639,6 +640,10 @@ struct crypto_tfm {
u32 crt_flags;
+ unsigned int is_hbk;
+
+ struct hw_bound_key_info hbk_info;
+
int node;
void (*exit)(struct crypto_tfm *tfm);
--
2.17.1
More information about the Linux-security-module-archive
mailing list