On Wed, Sep 26, 2012 at 12:52:10PM +0800, Gao feng wrote:
> +
> int netlink_dump_start(struct sock *ssk, struct sk_buff *skb,
> const struct nlmsghdr *nlh,
> struct netlink_dump_control *control)
> @@ -1786,6 +1794,7 @@ int netlink_dump_start(struct sock *
On Wed, Sep 26, 2012 at 12:52:17PM +0800, Gao feng wrote:
> use proper netlink_dump_control.done and .module to avoid panic.
>
> Signed-off-by: Gao feng
> Cc: Herbert Xu
> ---
> crypto/crypto_user.c |6 +-
> 1 files changed, 5 insertions(+), 1 deletions(-)
>
> diff --git a/crypto/crypt
On Wed, Jul 25, 2012 at 06:14:52AM +, Geanta Neag Horia Ioan-B05471 wrote:
> Hello,
>
> Is there any way to create an IPsec tunnel and indicate using
> extended sequnce numbers?
The strongswan ike deamon supports extended sequnce numbers.
>
> It seems that currently iproute2 doesn't support
git commit 398710379 (crypto: algapi - Move larval completion
into algboss) replaced accidentally a call to complete_all() by
a call to complete(). This causes a hang on crypto allocation
if we have more than one larval waiter. This pach restores the
call to complete_all().
Signed-off-by: Steffen
On Wed, Mar 28, 2012 at 01:53:41PM +0200, Sebastien Agnolini wrote:
> Hey,
>
> How activate the IPsec parallelization ?
You need to instantiate pcrypt.
You need either crconf (linux-3.2 or newer with the crypto userconfig
api enabled) or the tcrypt module to instantiate pcrypt.
With crconf:
Yo
The default netlink message size limit might be exceeded when dumping a
lot of algorithms to userspace. As a result, not all of the instantiated
algorithms dumped to userspace. So calculate an upper bound on the message
size and call netlink_dump_start() with that value.
Signed-off-by: Steffen
lookup these algorithms. So export the lookup functions for these
algorithms and use them in crypto_add_alg().
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c|4 +-
crypto/aead.c |4 +-
crypto/crypto_user.c | 72
On Thu, Mar 29, 2012 at 07:53:30AM +0200, Steffen Klassert wrote:
>
> Ok, so I'll respin this one to the mainline and resend.
I'll resend the whole patchset, please ignore this one.
Thanks!
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" i
On Thu, Mar 29, 2012 at 01:46:26PM +0800, Herbert Xu wrote:
> On Thu, Mar 29, 2012 at 07:45:04AM +0200, Steffen Klassert wrote:
> > On Mon, Mar 26, 2012 at 09:28:27AM +0200, Steffen Klassert wrote:
> > > +
> > > return netlink_dump_
On Mon, Mar 26, 2012 at 09:28:27AM +0200, Steffen Klassert wrote:
> +
> return netlink_dump_start(crypto_nlsk, skb, nlh,
> - link->dump, link->done, 0);
> + link->dump, link->done,
: Steffen Klassert
---
crypto/pcrypt.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/crypto/pcrypt.c b/crypto/pcrypt.c
index 29a89da..b2c99dc 100644
--- a/crypto/pcrypt.c
+++ b/crypto/pcrypt.c
@@ -280,11 +280,11 @@ static int pcrypt_aead_init_tfm(struct crypto_tfm
: Steffen Klassert
---
kernel/padata.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/kernel/padata.c b/kernel/padata.c
index 7875088..de3d0d9 100644
--- a/kernel/padata.c
+++ b/kernel/padata.c
@@ -356,13 +356,13 @@ static int padata_setup_cpumasks(struct
We don't remove the cpu that went offline from our cpumasks
on cpu hotplug. This got lost somewhere along the line, so
restore it. This fixes a hang of the padata instance on cpu
hotplug.
Signed-off-by: Steffen Klassert
---
kernel/padata.c |3 +++
1 files changed, 3 insertions(
Add a reference to the padata api documentation at Documentation/padata.txt
Suggested-by: Peter Zijlstra
Signed-off-by: Steffen Klassert
---
kernel/padata.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/kernel/padata.c b/kernel/padata.c
index 6f10eb2..7875088 100644
l/git/klassert/linux-stk padata-fixes
Steffen Klassert (3):
padata: Add a reference to the api documentation
padata: Use the online cpumask as the default
padata: Fix cpu hotplug
kernel/padata.c | 13 +
1 files changed, 9 insertions(+), 4 deletions(-)
--
To unsubs
The default netlink message size limit might be exceeded when dumping a
lot of algorithms to userspace. As a result, not all of the instantiated
algorithms dumped to userspace. So calculate an upper bound on the message
size and call netlink_dump_start() with that value.
Signed-off-by: Steffen
lookup these algorithms. So export the lookup functions for these
algorithms and use them when instantiating via crypto_add_alg().
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c|4 +-
crypto/aead.c |4 +-
crypto/crypto_user.c
this by converting the sequence number
from atomic_t to an unsigned int and protect the access with a
spin_lock. As a side effect, we get rid of the sequence number wrap
handling because the seqence number wraps back to null now without
the need to do anything.
Signed-off-by: Steffen Klassert
When a padata object is queued to the serialization queue, another
cpu might process and free the padata object. So don't dereference
it after queueing to the serialization queue.
Signed-off-by: Steffen Klassert
---
kernel/padata.c |6 --
1 files changed, 4 insertions(+), 2 dele
/linux/kernel/git/klassert/linux-stk padata-fixes
Steffen Klassert (2):
padata: Fix race in the serialization path
padata: Fix race on sequence number wrap
include/linux/padata.h |6 ++
kernel/padata.c| 44 ++--
2 files changed
On Thu, Feb 02, 2012 at 03:42:43PM +0100, Jesper Juhl wrote:
> On Thu, 2 Feb 2012, Steffen Klassert wrote:
> >
> > Your first patch is correct.
> >
> Thank you for the explanation.
>
> Can I take that to mean that I can add your Acked-by: if/when I resend the
On Wed, Feb 01, 2012 at 09:21:39PM +0100, Jesper Juhl wrote:
> On Wed, 1 Feb 2012, devendra.aaru wrote:
>
> > On Sun, Jan 29, 2012 at 5:39 PM, Jesper Juhl wrote:
> > > We declare 'exact' without initializing it and then do:
> > >
> > > [...]
> > > if (strlen(p->cru_driver_name))
> > >
sg_schedule race
> >
> > The percpu msg_schedule setup was unsafe as a user in a process
> > context can be interrupted by a softirq user which would then
> > scribble over the exact same work area. This was discovered by
> > Steffen Klasse
On Wed, Jan 11, 2012 at 11:36:11AM +1100, Herbert Xu wrote:
> On Wed, Jan 11, 2012 at 03:00:40AM +0300, Alexey Dobriyan wrote:
> > commit f9e2bca6c22d75a289a349f869701214d63b5060
> > aka "crypto: sha512 - Move message schedule W[80] to static percpu area"
> > created global message schedule area.
>
Hi.
On Wed, Nov 23, 2011 at 12:00:29AM +0200, Kasatkin, Dmitry wrote:
> Hi,
>
> I have noticed very odd behavior with hmac calculation on my dual
> core, 4 HTs PC.
> I am using async hash API to to calculate hmac over the page.
> I am using "hmac(sha1)" and the same key to calculate different pag
We leak the crypto instance when we unregister an instance with
crypto_del_alg(). Therefore we introduce crypto_unregister_instance()
to unlink the crypto instance from the template's instances list and
to free the recources of the instance properly.
Signed-off-by: Steffen Klassert
---
c
On Wed, Oct 05, 2011 at 01:33:33PM +0330, Hamid Nassiby wrote:
>
> OK, I represented code as PSEUSO, just to simplify and concentrate problem's
> aspects ;), (but it is also possible that I've concentrated it in a
> wrong way :D)
> This is my_cbc_encrypt code and functions it calls, bottom-up:
>
On Sun, Oct 09, 2011 at 01:00:08AM +0200, Sverd Johnsen wrote:
> Hey,
>
> how do they work? Should one use them? Does it work with all ciphers?
> Do they exclude each other?
They don't exclude each other, but using both in an algorithm instance
does not make much sense. It depends on your usecase
> above code I only utilize one of them.
> >From this point, we want to go a step further and utilize more than one aes
> engines of our device. Simplest solution appears to me is to deploy
> pcrypt/padata, made by Steffen Klassert. First instantiate in a dual
> core gateway :
&
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 20
1 files changed, 20 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 52459ae..748990f 100644
--- a/crypto/crypto_user.c
+++ b/crypto/crypto_user.c
@@ -89,6 +89,21
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 29 +
include/linux/cryptouser.h |8
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 8a0c5c6..52459ae 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/rng.c | 20
include/linux/cryptouser.h |6 ++
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/rng.c b/crypto/rng.c
index 45229ae..feb7de0 100644
--- a/crypto/rng.c
+++ b/crypto/rng.c
Signed-off-by: Steffen Klassert
---
crypto/pcompress.c | 18 ++
include/linux/cryptouser.h |5 +
2 files changed, 23 insertions(+), 0 deletions(-)
diff --git a/crypto/pcompress.c b/crypto/pcompress.c
index f7c4a7d..fefda78 100644
--- a/crypto/pcompress.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 23 +++
1 files changed, 23 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index bb641bd..701556f 100644
--- a/crypto/aead.c
+++ b/crypto/aead.c
@@ -190,6 +190,28 @@ static int
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 25 +
include/linux/cryptouser.h |9 +
2 files changed, 34 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 6729e8f..bb641bd 100644
--- a/crypto/aead.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c | 23 +++
1 files changed, 23 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index 5ea49ad..a816f24 100644
--- a/crypto/ablkcipher.c
+++ b/crypto/ablkcipher.c
@@ -457,6 +457,28
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c | 25 +
1 files changed, 25 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index fdc67d3..5ea49ad 100644
--- a/crypto/ablkcipher.c
+++ b/crypto/ablkcipher.c
@@ -23,6 +23,8
Signed-off-by: Steffen Klassert
---
crypto/blkcipher.c | 25 +
include/linux/cryptouser.h | 10 ++
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/crypto/blkcipher.c b/crypto/blkcipher.c
index 7a72192..2572d26 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/ahash.c | 21 +
1 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/crypto/ahash.c b/crypto/ahash.c
index f669822..a3e6ef9 100644
--- a/crypto/ahash.c
+++ b/crypto/ahash.c
@@ -21,6 +21,8 @@
#include
#include
Signed-off-by: Steffen Klassert
---
crypto/shash.c | 21 +
include/linux/cryptouser.h |7 +++
2 files changed, 28 insertions(+), 0 deletions(-)
diff --git a/crypto/shash.c b/crypto/shash.c
index 76f74b9..ea8a9c6 100644
--- a/crypto/shash.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 12
include/linux/cryptouser.h |5 +
2 files changed, 17 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index aa67c74..8a0c5c6 100644
--- a/crypto/crypto_user.c
+++ b
We add a report function pointer to struct crypto_type. This function
pointer is used from the crypto userspace configuration API to report
crypto algorithms to userspace.
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c|5 +
include/crypto/algapi.h |2 ++
2 files
This patch adds a basic userspace configuration API for the crypto layer.
With this it is possible to instantiate, remove and to show crypto
algorithms from userspace.
Signed-off-by: Steffen Klassert
---
crypto/Kconfig |7 +
crypto/Makefile|1 +
crypto
The upcomming crypto usrerspace configuration api needs
to remove the spawns on top on an algorithm, so export
crypto_remove_final.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c |5 ++---
crypto/internal.h |1 +
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a
The upcomming crypto usrerspace configuration api needs
to remove the spawns on top on an algorithm, so export
crypto_remove_spawns.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c |6 +++---
crypto/internal.h |2 ++
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a
The upcomming crypto user configuration api needs to identify
crypto instances. This patch adds a flag that is set if the
algorithm is an instance that is build from templates.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c|1 +
include/linux/crypto.h |5 +
2 files
This patchset adds a netlink based user configuration API for the crypto
layer, similar to the configuration API of xfrm.
The patchset is based on the current cryptodev tree.
A userspace tool that makes use of the configuration API is available at
https://sourceforge.net/projects/crconf/files/cr
On Wed, Sep 21, 2011 at 11:02:38AM +0200, Steffen Klassert wrote:
> +
> +static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
> +{
> + struct nlattr *attrs[CRYPTOCFGA_MAX+1];
> + struct crypto_link *link;
> + int type, err;
> +
> +
On Sat, Sep 24, 2011 at 01:21:25PM +1000, Herbert Xu wrote:
>
> I don't think you should distinguish between BLKCIPHER and ABLKCIPHER.
> A good rule of thumb would be if the report data structure is the
> same, then the type value should be the same.
>
Ok, will do that. I'll update the patches a
On Fri, Sep 23, 2011 at 03:55:54PM +1000, Herbert Xu wrote:
> On Wed, Sep 21, 2011 at 11:02:38AM +0200, Steffen Klassert wrote:
> >
> > +/* Netlink message attributes. */
> > +enum crypto_attr_type_t {
> > + CRYPTOCFGA_UNSPEC,
> > + CRYPTOC
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 20
include/linux/cryptouser.h |1 +
2 files changed, 21 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index cd08b2f..b5a55f6 100644
--- a/crypto/crypto_user.c
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 29 +
include/linux/cryptouser.h |8
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index a5e92a3..cd08b2f 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/rng.c | 20
include/linux/cryptouser.h |6 ++
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/rng.c b/crypto/rng.c
index 45229ae..feb7de0 100644
--- a/crypto/rng.c
+++ b/crypto/rng.c
Signed-off-by: Steffen Klassert
---
crypto/pcompress.c | 18 ++
include/linux/cryptouser.h |5 +
2 files changed, 23 insertions(+), 0 deletions(-)
diff --git a/crypto/pcompress.c b/crypto/pcompress.c
index f7c4a7d..e9801f0 100644
--- a/crypto/pcompress.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 23 +++
include/linux/cryptouser.h |1 +
2 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index bb641bd..44ced3c 100644
--- a/crypto/aead.c
+++ b/crypto/aead.c
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 25 +
include/linux/cryptouser.h |9 +
2 files changed, 34 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 6729e8f..bb641bd 100644
--- a/crypto/aead.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 23 +++
include/linux/cryptouser.h |1 +
2 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index 3b0dc30..3f8da55 100644
--- a/crypto/ablkcipher.c
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 25 +
include/linux/cryptouser.h |1 +
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index fdc67d3..3b0dc30 100644
--- a/crypto/ablkcipher.c
Signed-off-by: Steffen Klassert
---
crypto/blkcipher.c | 25 +
include/linux/cryptouser.h | 10 ++
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/crypto/blkcipher.c b/crypto/blkcipher.c
index 7a72192..2572d26 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/ahash.c | 21 +
include/linux/cryptouser.h |1 +
2 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/crypto/ahash.c b/crypto/ahash.c
index f669822..d5798fe 100644
--- a/crypto/ahash.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/shash.c | 21 +
include/linux/cryptouser.h |7 +++
2 files changed, 28 insertions(+), 0 deletions(-)
diff --git a/crypto/shash.c b/crypto/shash.c
index 76f74b9..cc3049f 100644
--- a/crypto/shash.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 12
include/linux/cryptouser.h |5 +
2 files changed, 17 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 12cec5e..a5e92a3 100644
--- a/crypto/crypto_user.c
+++ b
We add a report function pointer to struct crypto_type. This function
pointer is used from the crypto userspace configuration API to report
crypto algorithms to userspace.
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c|8
include/crypto/algapi.h |2 ++
2 files
This patch adds a basic userspace configuration API for the crypto layer.
With this it is possible to instantiate, remove and to show crypto
algorithms from userspace.
Signed-off-by: Steffen Klassert
---
crypto/Kconfig |7 +
crypto/Makefile|1 +
crypto
The upcomming crypto usrerspace configuration api needs
to remove the spawns on top on an algorithm, so export
crypto_remove_final.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c |5 ++---
crypto/internal.h |1 +
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a
The upcomming crypto usrerspace configuration api needs
to remove the spawns on top on an algorithm, so export
crypto_remove_spawns.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c |6 +++---
crypto/internal.h |2 ++
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a
The upcomming crypto user configuration api needs to identify
crypto instances. This patch adds a flag that is set if the
algorithm is an instance that is build from templates.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c|1 +
include/linux/crypto.h |5 +
2 files
This patchset adds a netlink based user configuration API for the crypto
layer, similar to the configuration API of xfrm.
The patchset is based on the current cryptodev-2.6 tree.
A userspace tool that makes use of the configuration API is available at
https://sourceforge.net/projects/crconf/file
On Mon, Aug 15, 2011 at 04:55:46PM +0800, Herbert Xu wrote:
> On Mon, Aug 15, 2011 at 10:02:57AM +0200, Steffen Klassert wrote:
> >
> > I don't think it is broken. It's just easier to handle if an underlying
> > algorithm changes it's priority. If the user c
On Mon, Aug 22, 2011 at 02:59:01PM +0800, Herbert Xu wrote:
> On Wed, Aug 17, 2011 at 02:10:13PM +0200, Steffen Klassert wrote:
> >
> > +struct crypto_user_alg {
> > + char cru_name[CRYPTO_MAX_ALG_NAME];
> > + char cru_driver_name[CRYPTO_MAX_ALG_NAME];
> > +
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 21 +
include/linux/cryptouser.h |1 +
2 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 9d10d2f..2cc3694 100644
--- a/crypto/crypto_user.c
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 29 +
include/linux/cryptouser.h |8
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 68d405d..9d10d2f 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/rng.c | 20
include/linux/cryptouser.h |6 ++
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/rng.c b/crypto/rng.c
index 45229ae..feb7de0 100644
--- a/crypto/rng.c
+++ b/crypto/rng.c
Signed-off-by: Steffen Klassert
---
crypto/pcompress.c | 18 ++
include/linux/cryptouser.h |5 +
2 files changed, 23 insertions(+), 0 deletions(-)
diff --git a/crypto/pcompress.c b/crypto/pcompress.c
index f7c4a7d..e9801f0 100644
--- a/crypto/pcompress.c
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 25 +
include/linux/cryptouser.h |1 +
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 17fec4a..ee5e060 100644
--- a/crypto/aead.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 27 +++
include/linux/cryptouser.h | 10 ++
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 6729e8f..17fec4a 100644
--- a/crypto/aead.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 25 +
include/linux/cryptouser.h |1 +
2 files changed, 26 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index 60f5c01..45ed1c3 100644
--- a/crypto/ablkcipher.c
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 27 +++
include/linux/cryptouser.h | 11 +++
2 files changed, 38 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index fdc67d3..60f5c01 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/blkcipher.c | 25 +
include/linux/cryptouser.h | 10 ++
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/crypto/blkcipher.c b/crypto/blkcipher.c
index 7a72192..2572d26 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/ahash.c | 23 +++
include/linux/cryptouser.h |8
2 files changed, 31 insertions(+), 0 deletions(-)
diff --git a/crypto/ahash.c b/crypto/ahash.c
index f669822..83827cc 100644
--- a/crypto/ahash.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/shash.c | 21 +
include/linux/cryptouser.h |7 +++
2 files changed, 28 insertions(+), 0 deletions(-)
diff --git a/crypto/shash.c b/crypto/shash.c
index 76f74b9..140c337 100644
--- a/crypto/shash.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 13 +
include/linux/cryptouser.h |6 ++
2 files changed, 19 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index cb3a722..68d405d 100644
--- a/crypto/crypto_user.c
We add a report function pointer to struct crypto_type. This function
pointer is used from the crypto userspace configuration API to report
crypto algorithms to userspace.
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c|8
include/crypto/algapi.h |2 ++
2 files
This patch adds a basic userspace configuration API for the crypto layer.
With this it is possible to instantiate, remove and to show crypto
algorithms from userspace.
Signed-off-by: Steffen Klassert
---
crypto/Kconfig |7 +
crypto/Makefile|1 +
crypto
The upcomming crypto user configuration api needs to identify
crypto instances. This patch adds a flag that is set if the
algorithm is an instance that is build from templates.
Signed-off-by: Steffen Klassert
---
crypto/algapi.c|1 +
include/linux/crypto.h |5 +
2 files
This patchset adds a netlink based user configuration API for the crypto
layer, similar to the configuration API of xfrm.
The patchset is based on the current cryptodev-2.6 tree and also available
at branch 'crypto-user-config-api' of
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/linux-s
On Tue, Aug 16, 2011 at 08:30:51PM +0800, Herbert Xu wrote:
>
> We don't want to automatically update a value that the user may
> have previously set. So I think updating instances on mass won't
> work anyway.
>
> Besides, an instance may depend on an algorithm which should not
> influence its p
On Mon, Aug 15, 2011 at 04:55:46PM +0800, Herbert Xu wrote:
> On Mon, Aug 15, 2011 at 10:02:57AM +0200, Steffen Klassert wrote:
> >
> > I don't think it is broken. It's just easier to handle if an underlying
> > algorithm changes it's priority. If the user c
On Mon, Aug 15, 2011 at 03:19:29PM +0800, Herbert Xu wrote:
>
> Actually the reason it places a bigger weight on the cipher's
> priority is because typically ciphers are slower than hashes.
> So this is expressing the fact that we'd rather use a faster
> cipher with a slower hash than the other wa
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 21 +
include/linux/cryptouser.h |1 +
2 files changed, 22 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index 82f9fad..be6a193 100644
--- a/crypto/crypto_user.c
Signed-off-by: Steffen Klassert
---
crypto/crypto_user.c | 29 +
include/linux/cryptouser.h |8
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c
index fa68965..82f9fad 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/rng.c | 24
include/linux/cryptouser.h |6 ++
2 files changed, 30 insertions(+), 0 deletions(-)
diff --git a/crypto/rng.c b/crypto/rng.c
index 45229ae..3051375 100644
--- a/crypto/rng.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/pcompress.c | 22 ++
include/linux/cryptouser.h |5 +
2 files changed, 27 insertions(+), 0 deletions(-)
diff --git a/crypto/pcompress.c b/crypto/pcompress.c
index f7c4a7d..3fc8ed7 100644
--- a/crypto/pcompress.c
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 29 +
include/linux/cryptouser.h |1 +
2 files changed, 30 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 25793b7..218ecc8 100644
--- a/crypto/aead.c
+++ b/crypto
Signed-off-by: Steffen Klassert
---
crypto/aead.c | 31 +++
include/linux/cryptouser.h | 10 ++
2 files changed, 41 insertions(+), 0 deletions(-)
diff --git a/crypto/aead.c b/crypto/aead.c
index 6729e8f..25793b7 100644
--- a/crypto/aead.c
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 29 +
include/linux/cryptouser.h |1 +
2 files changed, 30 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index d9b6717..c19d14b 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/ablkcipher.c| 31 +++
include/linux/cryptouser.h | 11 +++
2 files changed, 42 insertions(+), 0 deletions(-)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index fdc67d3..d9b6717 100644
--- a
Signed-off-by: Steffen Klassert
---
crypto/blkcipher.c | 29 +
include/linux/cryptouser.h | 10 ++
2 files changed, 39 insertions(+), 0 deletions(-)
diff --git a/crypto/blkcipher.c b/crypto/blkcipher.c
index 7a72192..b85a67d 100644
--- a/crypto
Signed-off-by: Steffen Klassert
---
crypto/ahash.c | 27 +++
include/linux/cryptouser.h |8
2 files changed, 35 insertions(+), 0 deletions(-)
diff --git a/crypto/ahash.c b/crypto/ahash.c
index f669822..5dce6a0 100644
--- a/crypto/ahash.c
+++ b
Signed-off-by: Steffen Klassert
---
crypto/shash.c | 25 +
include/linux/cryptouser.h |7 +++
2 files changed, 32 insertions(+), 0 deletions(-)
diff --git a/crypto/shash.c b/crypto/shash.c
index 76f74b9..d27a134 100644
--- a/crypto/shash.c
+++ b
101 - 200 of 383 matches
Mail list logo