crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no fu
On Fri, Nov 19, 2010 at 05:51:36PM +0800, Herbert Xu wrote:
>
> Miroslave found quite a few more problems with the patch-set
> so here is another revision with those problems resolved:
OK two more bugs found and fixed so here is one more revision:
* If recvmsg leaves bytes behind in the last SG
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no fu
On Mon, Nov 15, 2010 at 03:55:49PM +0100, Martin Willi wrote:
>
> > This patch adds the af_alg plugin for symmetric key ciphers,
> > corresponding to the ablkcipher kernel operation type.
>
> I can confirm that the newest patch fixes the page leak.
>
> Tested-by: Martin Willi
Thanks Martin!
M
> This patch adds the af_alg plugin for symmetric key ciphers,
> corresponding to the ablkcipher kernel operation type.
I can confirm that the newest patch fixes the page leak.
Tested-by: Martin Willi
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a m
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no fu
On Mon, Nov 08, 2010 at 10:10:20AM +0100, Martin Willi wrote:
>
> The test program below runs 1000 encryptions:
>
> # grep nr_free /proc/vmstat
> nr_free_pages 11031
> # ./test
Thanks, Miroslav identified a bogosity where if we're not doing
a whole page then the last sgl pointer is off by one w
> Hmm, can you show me your test program and how you determined
> that it was leaking pages?
The test program below runs 1000 encryptions:
# grep nr_free /proc/vmstat
nr_free_pages 11031
# ./test
...
# grep nr_free /proc/vmstat
nr_free_pages 10026
# ./test
...
# grep nr_free /proc/vmstat
nr_f
Martin Willi wrote:
> Hi Herbert,
>
> I did a proof-of-concept implementation for our crypto library, the
> interface looks good so far. All our hash, hmac, xcbc and cipher test
> vectors matched.
>
>> + sg_assign_page(sg + i, alloc_page(GFP_KERNEL));
>
> Every skcipher oper
Hi Herbert,
I did a proof-of-concept implementation for our crypto library, the
interface looks good so far. All our hash, hmac, xcbc and cipher test
vectors matched.
> + sg_assign_page(sg + i, alloc_page(GFP_KERNEL));
Every skcipher operation leaks memory on my box (this pag
From: Herbert Xu
Date: Thu, 04 Nov 2010 12:36:20 -0500
> crypto: algif_skcipher - User-space interface for skcipher operations
>
> This patch adds the af_alg plugin for symmetric key ciphers,
> corresponding to the ablkcipher kernel operation type.
>
> Keys can optionally be set through the set
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no fu
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no fu
13 matches
Mail list logo