"authenc" and "hmac" are templates, not different implementations of a cipher.
Please take a look at:
https://kernel.readthedocs.io/en/sphinx-samples/crypto-API.html#terminology
On Thu, Apr 6, 2017 at 9:56 AM, Harsh Jain wrote:
> On Tue, Apr 4, 2017 at 6:07 PM, Stephan Müller wrote:
>> Am Dien
Hi,
Based on my old experience with "struct crypto_alg" based drivers, the
data you receive there, is padded beforehand(in the upper layers);
Therefore the plaintext contains integral multiple of AES block size
of data and based on the number of blocks, the crypto transform can be
computed.
Regar
Hi,
In geode-aes, there is not any IV generation mechanism. In fact IV is
delivered to geode-aes's
registered algorithms, from upper layers.For example in case of
"cbc-aes-geode" algorithm,
from cbc wrapper ("cbc.c") via walk->iv:
blkcipher_walk_init(&walk, dst, src, nbytes);
err = blkcipher_walk
You must instantiate pcrypt using crconf app or tcrypt module;
On Wed, Mar 28, 2012 at 4:23 PM, Sebastien Agnolini
wrote:
>
> Hey,
>
> How activate the IPsec parallelization ?
> I compiled the crypto-2.6 kernel with this param :
> CONFIG_CRYPTO_... = y
> CONFIG_PADATA = y
> CONFIG_SMP=y
> After i
On 10/11/11, Steffen Klassert wrote:
>
> I can't tell much when looking at this code snippet. One guess would be
> someone (maybe you) has set the CRYPTO_TFM_REQ_MAY_SLEEP flag, as
> blkcipher_walk_done calls crypto_yield() which in turn might call
> schedule() if this flag is set. prcypt removes
On Tue, Oct 4, 2011 at 11:27 AM, Steffen Klassert
wrote:
>
> On Sat, Oct 01, 2011 at 12:38:19PM +0330, Hamid Nassiby wrote:
> >
> > And my_cbc_encrypt function as PSEUDO/real code (for simplicity of
> > representation) is as:
> >
> > static int
> >
Hi all,
Referring my previous posts in crypto list related to our hardware aes
accelerator project, I finally could deploy device in IPSec successfully. As I
mentioned earlier, my driver registers itself in kernel as blkcipher for
cbc(aes) as follows:
static struct crypto_alg my_cbc_alg = {
On Thu, Jan 27, 2011 at 3:03 AM, Herbert Xu wrote:
>
> On Wed, Jan 26, 2011 at 11:20:22AM +0330, Hamid Nassiby wrote:
> >
> > Do you mean that different IP packets fit into one single Block Cipher tfm?
> > Would you please explain expansively?
>
> We allocate
On Wed, Jan 26, 2011 at 10:39 AM, Herbert Xu
wrote:
> On Wed, Jan 26, 2011 at 10:26:33AM +0330, Hamid Nassiby wrote:
>>
>> As you know, I posted my problem again to crypto list and no one answered.
>> Now I
>> emphasize one aspect of the problem as a concept related
On Sat, Jan 8, 2011 at 11:09 AM, Hamid Nassiby wrote:
>
> On Fri, Dec 31, 2010 at 12:49 AM, Herbert Xu
> wrote:
> >
> > Hamid Nassiby wrote:
> > > Hi,
> > >
> > > As some good news and additional information, with the following patch
> &
On Fri, Dec 31, 2010 at 12:49 AM, Herbert Xu
wrote:
>
> Hamid Nassiby wrote:
> > Hi,
> >
> > As some good news and additional information, with the following patch
> > I no more get
> > "UDP bad cheksum" error as I mentioned erlier with Iperf in ud
ret = mydriver_transform(op, 0);
nbytes -= ret;
err = blkcipher_walk_done(desc, &walk, nbytes);
- }
+
return err;
}
+
-- Forwarded message --
From: Hamid Nassiby
Date: Sun, Dec 19, 2010 at 4:28 PM
Subject: crypto accel
Hi All,
In a research project, we've developed a crypto accelerator based on Xilinx
Virtex5 FPGA family which is connected to PC through PCI-Express slot and is
used by IPSec to offload crypto processing from CPU. The accelerator only
provides AES and DES3_EDE algorithms and I am responsible for p
13 matches
Mail list logo