Re: Status of aes in Debian/Ubuntu? (UNCLASSIFIED)

2012-03-29 Thread Dale Amon
Just thought it might be useful for someone else in the future if I feed back the results of some of my tests. The first test is the set up of a dm-crypt based loop back partition: # Create a file for our little 30GB test disk dd if=/dev/zero of=other.ext4 count=60M # Con

Re: Old PADATA patch vs crypto-2.6 tree

2012-03-29 Thread Hamid Nassiby
You must instantiate pcrypt using crconf app or tcrypt module; On Wed, Mar 28, 2012 at 4:23 PM, Sebastien Agnolini wrote: > > Hey, > > How activate the IPsec parallelization ? > I compiled the crypto-2.6 kernel with this param : > CONFIG_CRYPTO_... = y > CONFIG_PADATA = y > CONFIG_SMP=y > After i

Re: Status of aes in Debian/Ubuntu? (UNCLASSIFIED)

2012-03-29 Thread roosa, william MAJ RES
Classification: UNCLASSIFIED Seems to hang when it can't find the kernel headers. If you forget that they can come with the package for a moment and just install them directly. If you've been away for some time you probably did not get the memo that systems don't come with the headers or kernel

Re: [PATCH] powerpc/crypto: caam - add backward compatible string sec4.0

2012-03-29 Thread Herbert Xu
On Thu, Mar 22, 2012 at 07:15:09PM -0500, Kim Phillips wrote: > On Wed, 21 Mar 2012 14:09:10 +0800 > Shengzhou Liu wrote: > > > In some device trees of previous version, there were string "fsl,sec4.0". > > To be backward compatible with device trees, we have CAAM driver first > > check "fsl,sec-v

[PATCH v2 2/2] crypto: user - Fix size of netlink dump message

2012-03-29 Thread Steffen Klassert
The default netlink message size limit might be exceeded when dumping a lot of algorithms to userspace. As a result, not all of the instantiated algorithms dumped to userspace. So calculate an upper bound on the message size and call netlink_dump_start() with that value. Signed-off-by: Steffen Kla

[PATCH v2 1/2] crypto: user - Fix lookup of algorithms with IV generator

2012-03-29 Thread Steffen Klassert
We lookup algorithms with crypto_alg_mod_lookup() when instantiating via crypto_add_alg(). However, algorithms that are wrapped by an IV genearator (e.g. aead or genicv type algorithms) need special care. The userspace process hangs until it gets a timeout when we use crypto_alg_mod_lookup() to loo