I see the algif_hash and algif_blkcipher implementations to allow
userspace AF_ALG socket access to kernel blkcipher and hash
algorithms, but has anyone done a algif_compression to allow userspace
access to compression algs? I'm asking specifically wrt the 842
crypto module, which uses the hardwar
(struct caam_ctx) ctx->key_dma needs to be unmapped
when context is cleaned up.
Signed-off-by: Horia Geanta
---
drivers/crypto/caam/caamalg.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c
index b71f2fd749df..f44cfe065eb3 10
These defines might be needed by crypto drivers.
Signed-off-by: Horia Geanta
---
crypto/crypto_null.c | 6 +-
include/crypto/null.h | 11 +++
2 files changed, 12 insertions(+), 5 deletions(-)
create mode 100644 include/crypto/null.h
diff --git a/crypto/crypto_null.c b/crypto/cryp
Commit 61bb86bba169507a5f223b94b9176c32c84b4721
("crypto: caam - set descriptor sharing type to SERIAL")
changed the descriptor sharing mode from SHARE_WAIT to SHARE_SERIAL.
All descriptor commands that handle the "ok to share" and
"error propagation" settings should also go away, since they have
Add test vectors for aead with null encryption and md5,
respectively sha1 authentication.
Input data is taken from test vectors listed in RFC2410.
Signed-off-by: Horia Geanta
---
crypto/tcrypt.c | 8 +++
crypto/testmgr.c | 32 ++
crypto/testmgr.h | 180 +++
Add support for the following combinations:
-encryption: null
-authentication: md5, sha* (1, 224, 256, 384, 512)
Signed-off-by: Tudor Ambarus
Signed-off-by: Horia Geanta
---
drivers/crypto/caam/caamalg.c | 327 +-
drivers/crypto/caam/compat.h | 1 +
This implementation keeps the 64 bytes of workspace in registers rather than
on the stack, eliminating most of the loads and stores, and reducing the
instruction count by about 25%.
Signed-off-by: Ard Biesheuvel
---
Hello all,
No performance numbers I am allowed to share, unfortunately, so if an