On Fri, Dec 03, 2010 at 09:30:21AM +0800, Herbert Xu wrote:
>
> Andrew, I'll just back this out if it doesn't get resolved.
Andrew, the problem should be resolved in the current cryptodev
tree. Please let me know if it still blows up for you.
Thanks,
--
Email: Herbert Xu
Home Page: http://gond
Change notes:
Changed rng_rcvmsg to allocate a fixed size maximum temp block to store rng data
when recvmsg is called. This should prevent malicious DoS from user space by
tring to receive obscene amounts of random data in one call. Instead now we
loop using the same block of data and copy it inc
Tobias Karnat wrote:
In case it is based on TI OMAP, there are already drivers available:
No, unfortunately, it isn't.
-kb, the Kent who has looked through the existing crypto drivers to
learn how they work, and who would have loved to have found one that
matched his hardware.
--
To
- "Neil Horman" wrote:
> On Mon, Dec 13, 2010 at 12:24:34PM -0500, Miloslav Trmac wrote:
> > - "Neil Horman" wrote:
> > > +static int rng_recvmsg(struct kiocb *unused, struct socket
> *sock,
> > > + struct msghdr *msg, size_t len, int flags)
> > > +{
> > > + struct sock *
On Mon, Dec 13, 2010 at 12:24:34PM -0500, Miloslav Trmac wrote:
> - "Neil Horman" wrote:
> > +static int rng_recvmsg(struct kiocb *unused, struct socket *sock,
> > + struct msghdr *msg, size_t len, int flags)
> > +{
> > + struct sock *sk = sock->sk;
> > + struct alg_sock
Hi,
In case it is based on TI OMAP, there are already drivers available:
OMAP SHA1/MD5 driver:
http://marc.info/?l=linux-crypto-vger&m=127246431212905&w=2
http://marc.info/?l=linux-crypto-vger&m=129017544602970&w=2
OMAP2/3 AES HW accelerator driver:
http://marc.info/?l=linux-crypto-vger&m=128231
- "Neil Horman" wrote:
> +static int rng_recvmsg(struct kiocb *unused, struct socket *sock,
> + struct msghdr *msg, size_t len, int flags)
> +{
> + struct sock *sk = sock->sk;
> + struct alg_sock *ask = alg_sk(sk);
> + struct rng_ctx *ctx = ask->private;
> +
This patch enhances the AF_ALG protocol family to include support for random
number generator algorithms. With this enhancment, users of the AF_ALG protocol
can now bind sockets to instances of the various RNG algorithms available to the
kernel. For those RNG's that support it, instances can be r
On Fri, Dec 10, 2010 at 12:34:07PM +, tadeusz.st...@intel.com wrote:
> >From tadeusz.st...@intel.com Mon Sep 17 00:00:00 2001
> From: root
> Date: Fri, 10 Dec 2010 12:10:57 +
> Subject: [PATCH 2/3 v2] RFC4106 AES-GCM Driver Using Intel New Instructions -
> fixed build with binutils 2.16
>