Markus Huehnerbein <[EMAIL PROTECTED]> wrote:
>
> I thought that the problem is maybe related with the use of LUKS / the
> Master-Key created by the PBKDF2, so I tried cryptsetup without LUKS as
> follows (with the "geode_aes" module loaded):
>cryptsetup -y -c aes -h md5 -s 128 create devd
Jivin Eran Ben-Avi lays it down ...
>
> --- David McCullough
> <[EMAIL PROTECTED]> wrote:
>
> >
> >
> >
> > Jivin Eran Ben-Avi lays it down ...
> > > Hi,
> > >
> > > I tested IPSec(tunnel mode) routing performance
> > between 2 GbE ports using packet generator(SMARTBIT)
> > on ARM 500MHz wi
>> device-mapper: table: 254:1: crypt: Error initializing ESSIV hash
> This error message should only come up if dm was not able to allocate
> the hash in kernel so may miss SHA256 support.
By the output of lsmod the sha256 module is loaded. But anyway, I think
in order to benefit from the geode th
This patch implements CTR mode for IPSec.
It is based off of RFC 3686.
Please note:
1. it is assumed that plaintext is multiple of blocksize.
2. currently salt is extracted from the last 4 bytes of key.
Thus keys entered through setkey() have an additional 32 bits.
This causes problems for
On Thu, Aug 30, 2007 at 02:00:43PM +0300, Ronen Shitrit wrote:
>
> Is this the combined mode that was discussed on the mailing list before?
Authenc is just the first user of the crypto_aead interface.
Once IPsec moves across we will add others such as the CCM
algorithm.
> Is there a plan to add s
Hi
That was quick :)
This patch is a wrapper for the encryption and hash operations, which
mean the HW engine will do the encryption, and then the SW will do the
hash.
Is this the combined mode that was discussed on the mailing list before?
Is there a plan to add support for HW engines that can
* Markus Huehnerbein | 2007-08-29 22:29:10 [+0200]:
>Yes, again you're right, if I use a hash with 256 bit I get the
>following syslog errors:
>
>device-mapper: table: 254:1: crypt: Error initializing ESSIV hash
This error message should only come up if dm was not able to allocate
the hash in kern
[CRYPTO] aead: Add authenc
This patch adds the authenc algorithm which constructs an AEAD algorithm
from an asynchronous block cipher and a hash. The construction is done
by concatenating the encrypted result from the cipher with the output
from the hash, as is used by the IPsec ESP protocol.
Th
[CRYPTO] api: Move scatterwalk into algapi
The scatterwalk code is only used by algorithms that can be built as
a module. Therefore we can move it into algapi.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
crypto/Makefile |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff
[CRYPTO] scatterwalk: Add scatterwalk_map_and_copy
This patch adds the function scatterwalk_map_and_copy which reads or
writes a chunk of data from a scatterlist at a given offset. It will
be used by authenc which would read/write the authentication data at
the end of the cipher/plain text.
Sign
[CRYPTO] api: Fixed crypto_*_reqsize return type
This patch changes the return type of crypto_*_reqsize from int to
unsigned int which matches what the underlying type is (and should
be).
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
include/linux/crypto.h |5 +++--
1 files changed, 3 i
[CRYPTO] api: Add missing headers for setkey_unaligned
This patch ensures that kernel.h and slab.h are included for
the setkey_unaligned function. It also breaks a couple of
long lines.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
crypto/ablkcipher.c |5 -
crypto/blkcipher.c |
[CRYPTO] ablkcipher: Remove queue pointer from common alg object
Since not everyone needs a queue pointer and those who need it can
always get it from the context anyway the queue pointer in the
common alg object is redundant.
Signed-off-by: Herbert Xu <[EMAIL PROTECTED]>
---
crypto/ablkcipher.
[CRYPTO] api: Add aead crypto type
This patch adds crypto_aead which is the interface for AEAD
(Authenticated Encryption with Associated Data) algorithms.
AEAD algorithms perform authentication and encryption in one
step. Traditionally users (such as IPsec) would use two
different crypto algorit
[CRYPTO] api: Add support for multiple template parameters
This patch adds support for having multiple parameters to
a template, separated by a comma. It also adds support
for integer parameters in addition to the current algorithm
parameter type.
This will be used by the authenc template which
Hi:
I'm about add these patches to cryptodev-2.6.
They create a new operation called crypto_aead which will
support AEAD (Authenticated Encryption with Associated Data)
algorithms. Essentially they combine the functionality of
the current blkcipher and hash operations into one.
This will be use
--- David McCullough
<[EMAIL PROTECTED]> wrote:
>
>
>
> Jivin Eran Ben-Avi lays it down ...
> > Hi,
> >
> > I tested IPSec(tunnel mode) routing performance
> between 2 GbE ports using packet generator(SMARTBIT)
> on ARM 500MHz with latest OCF patched on
> Openswan2.4.9 and I noticed the call
17 matches
Mail list logo