Just thought it might be useful for someone else
in the future if I feed back the results of some
of my tests.
The first test is the set up of a dm-crypt based
loop back partition:
# Create a file for our little 30GB test disk
dd if=/dev/zero of=other.ext4 count=60M
# Con
You must instantiate pcrypt using crconf app or tcrypt module;
On Wed, Mar 28, 2012 at 4:23 PM, Sebastien Agnolini
wrote:
>
> Hey,
>
> How activate the IPsec parallelization ?
> I compiled the crypto-2.6 kernel with this param :
> CONFIG_CRYPTO_... = y
> CONFIG_PADATA = y
> CONFIG_SMP=y
> After i
Classification: UNCLASSIFIED
Seems to hang when it can't find the kernel headers.
If you forget that they can come with the package for a moment and just install
them directly. If you've been away for some time you probably did not get the
memo that systems don't come with the headers or kernel
On Thu, Mar 22, 2012 at 07:15:09PM -0500, Kim Phillips wrote:
> On Wed, 21 Mar 2012 14:09:10 +0800
> Shengzhou Liu wrote:
>
> > In some device trees of previous version, there were string "fsl,sec4.0".
> > To be backward compatible with device trees, we have CAAM driver first
> > check "fsl,sec-v
The default netlink message size limit might be exceeded when dumping a
lot of algorithms to userspace. As a result, not all of the instantiated
algorithms dumped to userspace. So calculate an upper bound on the message
size and call netlink_dump_start() with that value.
Signed-off-by: Steffen Kla
We lookup algorithms with crypto_alg_mod_lookup() when instantiating via
crypto_add_alg(). However, algorithms that are wrapped by an IV genearator
(e.g. aead or genicv type algorithms) need special care. The userspace
process hangs until it gets a timeout when we use crypto_alg_mod_lookup()
to loo