Ramakesavan, Ramu wrote:
> I am new to Linux Crypto APIs. I can see usage of asynchronous cipher
> algorithms in testmgr.c. Is there a sample implementation for async cipher
> driver that uses crypto_ablkcipher or crypto_ahash? If there is one, pleas
> point me to it.
Have a look under driver
On Thu, Jul 16, 2009 at 11:46:14PM +0800, Herbert Xu wrote:
>
> My suggestion would be to optimise for the common case, where
> assoc is a single-entry list. So just put some space aside in
> the request context for a two-entry sg list and copy the assoc
> sg entry into it and chain it with the r
On Fri, Jul 17, 2009 at 12:23:45AM +0200, Sebastian Andrzej Siewior wrote:
>
> Okay, Herbert it is working. I've setup a tunnel between two boxes and
> was able to ping and copy stuff from /dev/zero on one box to /dev/null
> on the other.
Awesome, thanks a lot for verifying this Sebastian!
--
Vi
* Sebastian Andrzej Siewior | 2009-07-16 09:36:30 [+0200]:
>* Herbert Xu | 2009-07-16 10:34:13 [+0800]:
>
>>On Thu, Jul 16, 2009 at 10:16:01AM +0800, Herbert Xu wrote:
>>>
>>> Can you please pull my tree again? There were quite a few bugs
>>> that I fixed last night.
>>
>>Oh and please make sure y
I am new to Linux Crypto APIs. I can see usage of asynchronous cipher
algorithms in testmgr.c. Is there a sample implementation for async cipher
driver that uses crypto_ablkcipher or crypto_ahash? If there is one, pleas
point me to it.
Ramu
--
To unsubscribe from this list: send the line "un
On Thu, Jul 16, 2009 at 01:15:48PM +0200, Steffen Klassert wrote:
>
> Since the calls to the hash algorithms can now return asynchronous, I'd like
> to avoid multiple calls to the hash update functions. I'd rather like to do
> all the hashing with one call to crypto_ahash_digest(). As it is, this
>
Hi community,
The following VMAC(AES) patch, ported from http://fastcrypto.org/vmac,
is used to support S3 memory integrity verification for Intel(R) Trusted
Execution Technology (for more about Intel(R) TXT patches, see
http://lkml.org/lkml/2009/6/22/578), since the VMAC algorithm is very
fast
Hi community,
The following VMAC(AES) patch, ported from http://fastcrypto.org/vmac,
is used to support S3 memory integrity verification for Intel(R) Trusted
Execution Technology (for more about Intel(R) TXT patches, see
http://lkml.org/lkml/2009/6/22/578), since the VMAC algorithm is very
fa
The last users of skb_icv_walk are converted to ahash now,
so skb_icv_walk is unused and can be removed.
Signed-off-by: Steffen Klassert
---
include/net/xfrm.h |3 --
net/xfrm/xfrm_algo.c | 78 --
2 files changed, 0 insertions(+), 81 deleti
ah4 and ah6 are converted to ahash now, so we can remove the
code for the obsolete hash algorithm.
Signed-off-by: Steffen Klassert
---
include/net/ah.h | 29 +++--
1 files changed, 3 insertions(+), 26 deletions(-)
diff --git a/include/net/ah.h b/include/net/ah.h
index
This patch converts ah6 to the new ahash interface.
Signed-off-by: Steffen Klassert
---
net/ipv6/ah6.c | 352 +++-
1 files changed, 272 insertions(+), 80 deletions(-)
diff --git a/net/ipv6/ah6.c b/net/ipv6/ah6.c
index 86f42a2..9fb063c 100644
This patch converts ah4 to the new ahash interface.
Signed-off-by: Steffen Klassert
---
net/ipv4/ah4.c | 295 ---
1 files changed, 236 insertions(+), 59 deletions(-)
diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c
index e878e49..68436fd 100644
-
To support for ahash algorithms, we add a pointer to a
crypto_ahash to ah_data.
Signed-off-by: Steffen Klassert
---
include/net/ah.h |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/include/net/ah.h b/include/net/ah.h
index ae1c322..7ac5221 100644
--- a/include/net/ah.h
+
This patch converts authenc to the new ahash interface.
Signed-off-by: Steffen Klassert
---
crypto/authenc.c | 215 +
1 files changed, 150 insertions(+), 65 deletions(-)
diff --git a/crypto/authenc.c b/crypto/authenc.c
index 2e16ce0..bd456e3
To be able to chain all the scatterlists we add an additional
scatterlist entry to the scatterlist of the associated data.
To keep compatibility we set the termination bit at the first
entry. This can be reverted as soon as we can use sg_chain().
Signed-off-by: Steffen Klassert
---
net/ipv4/esp4
This patchset converts IPsec over to the new ahash interface.
The pachset applies to cryptodev-2.6. I was able to test the synchronous
codepaths, the asynchronous ones are untested.
I'm still somewhat unhappy with the ahash version of authenc, but I decided
to post anyway as a base for discussion.
* Herbert Xu | 2009-07-16 10:34:13 [+0800]:
>On Thu, Jul 16, 2009 at 10:16:01AM +0800, Herbert Xu wrote:
>>
>> Can you please pull my tree again? There were quite a few bugs
>> that I fixed last night.
>
>Oh and please make sure you have this patch applied too:
It passes the testmgr with that pat
17 matches
Mail list logo