Re: Openswan 2.4.9 - tasklet or workqueue ?

2007-08-30 Thread Eran Ben-Avi
--- David McCullough <[EMAIL PROTECTED]> wrote: > > > > Jivin Eran Ben-Avi lays it down ... > > Hi, > > > > I tested IPSec(tunnel mode) routing performance > between 2 GbE ports using packet generator(SMARTBIT) > on ARM 500MHz with latest OCF patched on > Openswan2.4.9 and I noticed the call

[0/8] [CRYPTO]: Add AEAD/authenc support

2007-08-30 Thread Herbert Xu
Hi: I'm about add these patches to cryptodev-2.6. They create a new operation called crypto_aead which will support AEAD (Authenticated Encryption with Associated Data) algorithms. Essentially they combine the functionality of the current blkcipher and hash operations into one. This will be use

[PATCH 1/8] [CRYPTO] api: Add aead crypto type

2007-08-30 Thread Herbert Xu
[CRYPTO] api: Add aead crypto type This patch adds crypto_aead which is the interface for AEAD (Authenticated Encryption with Associated Data) algorithms. AEAD algorithms perform authentication and encryption in one step. Traditionally users (such as IPsec) would use two different crypto algorit

[PATCH 2/8] [CRYPTO] api: Add support for multiple template parameters

2007-08-30 Thread Herbert Xu
[CRYPTO] api: Add support for multiple template parameters This patch adds support for having multiple parameters to a template, separated by a comma. It also adds support for integer parameters in addition to the current algorithm parameter type. This will be used by the authenc template which

[PATCH 3/8] [CRYPTO] api: Add missing headers for setkey_unaligned

2007-08-30 Thread Herbert Xu
[CRYPTO] api: Add missing headers for setkey_unaligned This patch ensures that kernel.h and slab.h are included for the setkey_unaligned function. It also breaks a couple of long lines. Signed-off-by: Herbert Xu <[EMAIL PROTECTED]> --- crypto/ablkcipher.c |5 - crypto/blkcipher.c |

[PATCH 4/8] [CRYPTO] ablkcipher: Remove queue pointer from common alg object

2007-08-30 Thread Herbert Xu
[CRYPTO] ablkcipher: Remove queue pointer from common alg object Since not everyone needs a queue pointer and those who need it can always get it from the context anyway the queue pointer in the common alg object is redundant. Signed-off-by: Herbert Xu <[EMAIL PROTECTED]> --- crypto/ablkcipher.

[PATCH 5/8] [CRYPTO] api: Move scatterwalk into algapi

2007-08-30 Thread Herbert Xu
[CRYPTO] api: Move scatterwalk into algapi The scatterwalk code is only used by algorithms that can be built as a module. Therefore we can move it into algapi. Signed-off-by: Herbert Xu <[EMAIL PROTECTED]> --- crypto/Makefile |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff

[PATCH 6/8] [CRYPTO] scatterwalk: Add scatterwalk_map_and_copy

2007-08-30 Thread Herbert Xu
[CRYPTO] scatterwalk: Add scatterwalk_map_and_copy This patch adds the function scatterwalk_map_and_copy which reads or writes a chunk of data from a scatterlist at a given offset. It will be used by authenc which would read/write the authentication data at the end of the cipher/plain text. Sign

[PATCH 7/8] [CRYPTO] api: Fixed crypto_*_reqsize return type

2007-08-30 Thread Herbert Xu
[CRYPTO] api: Fixed crypto_*_reqsize return type This patch changes the return type of crypto_*_reqsize from int to unsigned int which matches what the underlying type is (and should be). Signed-off-by: Herbert Xu <[EMAIL PROTECTED]> --- include/linux/crypto.h |5 +++-- 1 files changed, 3 i

[PATCH 8/8] [CRYPTO] aead: Add authenc

2007-08-30 Thread Herbert Xu
[CRYPTO] aead: Add authenc This patch adds the authenc algorithm which constructs an AEAD algorithm from an asynchronous block cipher and a hash. The construction is done by concatenating the encrypted result from the cipher with the output from the hash, as is used by the IPsec ESP protocol. Th

Re: Problem using dm-crypt with geode LX800 AES-Engine

2007-08-30 Thread Sebastian Siewior
* Markus Huehnerbein | 2007-08-29 22:29:10 [+0200]: >Yes, again you're right, if I use a hash with 256 bit I get the >following syslog errors: > >device-mapper: table: 254:1: crypt: Error initializing ESSIV hash This error message should only come up if dm was not able to allocate the hash in kern

RE: [PATCH 8/8] [CRYPTO] aead: Add authenc

2007-08-30 Thread Ronen Shitrit
Hi That was quick :) This patch is a wrapper for the encryption and hash operations, which mean the HW engine will do the encryption, and then the SW will do the hash. Is this the combined mode that was discussed on the mailing list before? Is there a plan to add support for HW engines that can

Re: [PATCH 8/8] [CRYPTO] aead: Add authenc

2007-08-30 Thread Herbert Xu
On Thu, Aug 30, 2007 at 02:00:43PM +0300, Ronen Shitrit wrote: > > Is this the combined mode that was discussed on the mailing list before? Authenc is just the first user of the crypto_aead interface. Once IPsec moves across we will add others such as the CCM algorithm. > Is there a plan to add s

[PATCH 1/1]: CTR mode implementation

2007-08-30 Thread Joy Latten
This patch implements CTR mode for IPSec. It is based off of RFC 3686. Please note: 1. it is assumed that plaintext is multiple of blocksize. 2. currently salt is extracted from the last 4 bytes of key. Thus keys entered through setkey() have an additional 32 bits. This causes problems for

Re: Problem using dm-crypt with geode LX800 AES-Engine

2007-08-30 Thread Markus Huehnerbein
>> device-mapper: table: 254:1: crypt: Error initializing ESSIV hash > This error message should only come up if dm was not able to allocate > the hash in kernel so may miss SHA256 support. By the output of lsmod the sha256 module is loaded. But anyway, I think in order to benefit from the geode th

Re: Openswan 2.4.9 - tasklet or workqueue ?

2007-08-30 Thread David McCullough
Jivin Eran Ben-Avi lays it down ... > > --- David McCullough > <[EMAIL PROTECTED]> wrote: > > > > > > > > > Jivin Eran Ben-Avi lays it down ... > > > Hi, > > > > > > I tested IPSec(tunnel mode) routing performance > > between 2 GbE ports using packet generator(SMARTBIT) > > on ARM 500MHz wi

Re: Problem using dm-crypt with geode LX800 AES-Engine

2007-08-30 Thread Herbert Xu
Markus Huehnerbein <[EMAIL PROTECTED]> wrote: > > I thought that the problem is maybe related with the use of LUKS / the > Master-Key created by the PBKDF2, so I tried cryptsetup without LUKS as > follows (with the "geode_aes" module loaded): >cryptsetup -y -c aes -h md5 -s 128 create devd