On a system with a 4 socket (NUMA) system where a large number of
application processes were all trying to read from /dev/urandom, this
can result in the system spending 80% of its time contending on the
global urandom spinlock. The application have used its own PRNG, but
let's try to help it from
From: Stephan Mueller
The Hyper-V Linux Integration Services use the VMBus implementation for
communication with the Hypervisor. VMBus registers its own interrupt
handler that completely bypasses the common Linux interrupt handling.
This implies that the interrupt entropy collector is not trigger
The CRNG is faster, and we don't pretend to track entropy usage in the
CRNG any more.
Signed-off-by: Theodore Ts'o
---
crypto/chacha20_generic.c | 61 --
drivers/char/random.c | 282 ++
include/crypto/chacha20.h | 1 +
lib/Makefile
Everyone is consing up their own random patches, so this is my set. :-)
By using a CRNG to replace the urandom pool, we address a number of
complaints which Stephan Mueller has been concerned about. We now use
a much more aggressive interrupt sampling system to quickly initialize
a CRNG which ge
Am Montag, 2. Mai 2016, 11:14:01 schrieb Gadre Nayan:
Hi Gadre,
> Hello,
>
> I have read the crypto library documentation on chronox.de.
>
> I used there sample code for symmetric key cipher operation.
> However in the check:
>
> skcipher = crypto_alloc_skcipher("cbc-aes-aesni", 0, 0);
> if (I
Hello,
I have read the crypto library documentation on chronox.de.
I used there sample code for symmetric key cipher operation.
However in the check:
skcipher = crypto_alloc_skcipher("cbc-aes-aesni", 0, 0);
if (IS_ERR(skcipher)) {
pr_info("could not allocate skcipher handle\n");
return PTR_ERR(s
This is a note to let you know that I've just added the patch titled
crypto: gcm - Fix rfc4543 decryption crash
to the 3.14-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
crypto-gcm-f
Am Sonntag, 1. Mai 2016, 19:05:12 schrieb Gadre Nayan:
Hi Gadre,
> Yes, i was reading about that till your reply came.
>
> So then if not hash...then should I use asymmetric or symmetric key APIs.
>
> My kernel version is 3.19, what APIs can I use which can compile with this
> kernel version.
>
Am Sonntag, 1. Mai 2016, 18:35:51 schrieb Gadre Nayan:
Hi Gadre,
> Hi,
>
> I wanted to implement a simple encryption decryption of data in kernel
> space to start with the kernel crypto library.
>
> I have the following:
>
> int myFunction() {
>
> struct scatterlist sg;
> stru
Hi,
I wanted to implement a simple encryption decryption of data in kernel
space to start with the kernel crypto library.
I have the following:
int myFunction() {
struct scatterlist sg;
struct crypto_hash *tfm;
struct hash_desc desc;
unsigned char input[21];
The ccp_actions structure is never modified, so declare it as const.
Done with the help of Coccinelle.
Signed-off-by: Julia Lawall
---
drivers/crypto/ccp/ccp-dev-v3.c |2 +-
drivers/crypto/ccp/ccp-dev.h|2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/cr
11 matches
Mail list logo