Re: [PATCH v3 1/1] crypto: AES CTR x86_64 "by8" AVX optimization

2014-06-06 Thread Mathias Krause
On Fri, Jun 06, 2014 at 05:12:05PM -0700, chandramouli narayanan wrote: > This patch introduces "by8" AES CTR mode AVX optimization inspired by > Intel Optimized IPSEC Cryptograhpic library. For additional information, > please see: > http://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=2

[PATCH] crypto/nx: disable NX on little endian builds

2014-06-06 Thread Anton Blanchard
The NX driver has endian issues so disable it for now. Signed-off-by: Anton Blanchard --- diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index 03ccdb0..8280a7a3 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig @@ -313,7 +313,7 @@ config CRYPTO_DEV_S5P config CRYP

[PATCH v3 1/1] crypto: AES CTR x86_64 "by8" AVX optimization

2014-06-06 Thread chandramouli narayanan
This patch introduces "by8" AES CTR mode AVX optimization inspired by Intel Optimized IPSEC Cryptograhpic library. For additional information, please see: http://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=22972 The functions aes_ctr_enc_128_avx_by8(), aes_ctr_enc_192_avx_by8() and aes

Re: [PATCH 0/2] Add in-kernel /dev/random equivalent

2014-06-06 Thread Stephan Mueller
Am Freitag, 6. Juni 2014, 13:59:00 schrieb Pavel Machek: Hi Pavel, >On Mon 2014-05-12 00:36:01, Stephan Mueller wrote: >> Hi, >> >> as discussed in thread [1], an in-kernel equivalent to the blocking >> /dev/random device behavior is suggested. This in-kernel blocking >> access to the RNG can be

Re: [PATCH 0/2] Add in-kernel /dev/random equivalent

2014-06-06 Thread Pavel Machek
On Mon 2014-05-12 00:36:01, Stephan Mueller wrote: > Hi, > > as discussed in thread [1], an in-kernel equivalent to the blocking > /dev/random device behavior is suggested. This in-kernel blocking access to > the RNG can be used to seed deterministic random number generators with > random > nu