On Fri, 31 Aug 2012 06:08:05 +0300, Liu Qiang-B32616
wrote:
> > -Original Message-
> > From: Geanta Neag Horia Ioan-B05471
> > Sent: Thursday, August 30, 2012 10:23 PM
> > To: Liu Qiang-B32616; linux-crypto@vger.kernel.org;
> > dan.j.willi...@gmail.com
On Thu, 9 Aug 2012 11:20:48 +0300, qiang@freescale.com wrote:
> From: Qiang Liu
>
> Expose Talitos's XOR functionality to be used for RAID parity
> calculation via the Async_tx layer.
>
> Cc: Herbert Xu
> Cc: David S. Miller
> Signed-off-by: Dipen Dudhat
> Signed-off-by: Maneesh Gupta
>
On Mon, 20 Aug 2012 11:32:12 +0300, Herbert Xu
wrote:
> On Wed, Aug 08, 2012 at 08:22:15PM -0500, Kim Phillips wrote:
>> On Wed, 8 Aug 2012 18:46:45 +0300
>> Horia Geanta wrote:
>>
>>> Support for ESNs (extended sequence numbers).
>>> Tested with strongswan on a P2020RDB back-to-back setup.
>>>
On Tue, 7 Aug 2012 09:54:14 +0300, Geanta Neag Horia Ioan-B05471
wrote:
> On Tue, 7 Aug 2012 04:47:51 +0300, Phillips Kim-R1AAHA
> wrote:
>> Also: if the algorithm name is really all that changes, can it be
>> done more space-efficiently with some string manipulation i
On Tue, 7 Aug 2012 04:47:51 +0300, Phillips Kim-R1AAHA
wrote:
> On Thu, 2 Aug 2012 17:16:41 +0300
> Horia Geanta wrote:
>
>> +.cra_name = "authencesn(hmac(sha1),cbc(aes))",
>> +.cra_driver_name = "authenc-hmac-sha1-cbc-aes-talitos",
>
> the driver name s
Hello,
Is there any way to create an IPsec tunnel and indicate using
extended sequnce numbers?
It seems that currently iproute2 doesn't support this.
Grepping for "esn" reveals that XFRM_STATE_ESN shows only in kernel headers.
The only relevant thing I found was a RFC sent by Steffen (Cc-ed),
bu
On Tue, 10 Jul 2012 09:00:14 +0300, Qiang Liu wrote:
> An error will be happened when test with mass data:
> "DMA-API: device driver tries to sync DMA memory it has not allocated";
> "DMA-API: debugging out of memory - disabling"
> dma mapping memory of request->desc is not released by right devic
On Mon, 9 Jul 2012 11:19:35 +0300, Herbert Xu
wrote:
> On Mon, Jul 09, 2012 at 11:17:43AM +0300, Horia Geanta wrote:
>> In case of AEAD, some crypto engines expect assoc data and iv to be
>> contiguous. This is how native IPsec works; make testmgr's behaviour
>> the same. (Alternative would be to
> -Original Message-
> From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto-
> ow...@vger.kernel.org] On Behalf Of Arun Murthy
> Sent: Wednesday, June 20, 2012 2:12 PM
> To: linux-crypto@vger.kernel.org; herb...@gondor.apana.org.au
> Cc: arun.mur...@stericsson.com; Berne Hebark
> S
> -Original Message-
> From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto-
> ow...@vger.kernel.org] On Behalf Of Helmut Schaa
> Sent: Wednesday, May 30, 2012 10:57 AM
> To: linux-crypto@vger.kernel.org
> Cc: Phillips Kim-R1AAHA; herb...@gondor.apana.org.au; Helmut Schaa; Sven
> S
10 matches
Mail list logo