<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/crypto/tcrypt.c, branch v2.6.20.6</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.20.6</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.20.6'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2006-12-07T02:38:58Z</updated>
<entry>
<title>[CRYPTO] tcrypt: LRW test vectors</title>
<updated>2006-12-07T02:38:58Z</updated>
<author>
<name>Rik Snel</name>
<email>rsnel@cube.dyndns.org</email>
</author>
<published>2006-11-29T08:01:41Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=f3d1044cd0a9b427a25b2492f4d503d2dd54cfd7'/>
<id>urn:sha1:f3d1044cd0a9b427a25b2492f4d503d2dd54cfd7</id>
<content type='text'>
Do modprobe tcrypt mode=10 to check the included test vectors, they are
from: http://grouper.ieee.org/groups/1619/email/pdf00017.pdf and from
http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html.

To make the last test vector fit, I had to increase the buffer size of
input and result to 512 bytes.

Signed-off-by: Rik Snel &lt;rsnel@cube.dyndns.org&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Add test vectors of AES_XCBC</title>
<updated>2006-12-07T02:38:50Z</updated>
<author>
<name>Kazunori MIYAZAWA</name>
<email>miyazawa@linux-ipv6.org</email>
</author>
<published>2006-10-28T03:18:53Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=5b2becf5dc8ebb760b0d1653604831dc0582a121'/>
<id>urn:sha1:5b2becf5dc8ebb760b0d1653604831dc0582a121</id>
<content type='text'>
est vectors of XCBC with AES-128.

Signed-off-by: Kazunori MIYAZAWA &lt;miyazawa@linux-ipv6.org&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] users: Use crypto_comp and crypto_has_*</title>
<updated>2006-09-21T01:46:22Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-26T08:12:40Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=e4d5b79c661c7cfca9d8d5afd040a295f128d3cb'/>
<id>urn:sha1:e4d5b79c661c7cfca9d8d5afd040a295f128d3cb</id>
<content type='text'>
This patch converts all users to use the new crypto_comp type and the
crypto_has_* functions.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Use HMAC template and hash interface</title>
<updated>2006-09-21T01:46:18Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-19T11:38:49Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=e9d41164e2fdd897fe4520c2079ea0000f6e0ec3'/>
<id>urn:sha1:e9d41164e2fdd897fe4520c2079ea0000f6e0ec3</id>
<content type='text'>
This patch converts tcrypt to use the new HMAC template rather than the
hard-coded version of HMAC.  It also converts all digest users to use
the new cipher interface.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Use block ciphers where applicable</title>
<updated>2006-09-21T01:44:50Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-12T22:26:09Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=cba83564d112e4aec52227f68670f8dbd4d4ac89'/>
<id>urn:sha1:cba83564d112e4aec52227f68670f8dbd4d4ac89</id>
<content type='text'>
This patch converts tcrypt to use the new block cipher type where
applicable.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Use test_hash for crc32c</title>
<updated>2006-09-21T01:41:03Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-21T12:04:03Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c907ee76d8456fe1d98f40b5febfc7802a73b784'/>
<id>urn:sha1:c907ee76d8456fe1d98f40b5febfc7802a73b784</id>
<content type='text'>
Now that crc32c has been fixed to conform with standard digest semantics,
we can use test_hash for it.  I've turned the last test into a chunky
test.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] api: Get rid of flags argument to setkey</title>
<updated>2006-09-21T01:41:02Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-13T04:16:39Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=560c06ae1ab7c677002ea3b6ac83521bf12ee07d'/>
<id>urn:sha1:560c06ae1ab7c677002ea3b6ac83521bf12ee07d</id>
<content type='text'>
Now that the tfm is passed directly to setkey instead of the ctx, we no
longer need to pass the &amp;tfm-&gt;crt_flags pointer.

This patch also gets rid of a few unnecessary checks on the key length
for ciphers as the cipher layer guarantees that the key length is within
the bounds specified by the algorithm.

Rather than testing dia_setkey every time, this patch does it only once
during crypto_alloc_tfm.  The redundant check from crypto_digest_setkey
is also removed.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] crc32c: Fix unconventional setkey usage</title>
<updated>2006-09-21T01:41:01Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-08-06T13:03:08Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=25cdbcd9e5d20e431f829cafce48a418830011f4'/>
<id>urn:sha1:25cdbcd9e5d20e431f829cafce48a418830011f4</id>
<content type='text'>
The convention for setkey is that once it is set it should not change,
in particular, init must not wipe out the key set by it.  In fact, init
should always be used after setkey before any digestion is performed.

The only user of crc32c that sets the key is tcrypt.  This patch adds
the necessary init calls there.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Speed benchmark support for digest algorithms</title>
<updated>2006-06-26T07:34:41Z</updated>
<author>
<name>Michal Ludvig</name>
<email>michal@logix.cz</email>
</author>
<published>2006-05-30T12:04:19Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=e805792851bcb0bb42f0c8a352be64564c13e374'/>
<id>urn:sha1:e805792851bcb0bb42f0c8a352be64564c13e374</id>
<content type='text'>
This patch adds speed tests (benchmarks) for digest algorithms.
Tests are run with different buffer sizes (16 bytes, ... 8 kBytes)
and with each buffer multiple tests are run with different update()
sizes (e.g. hash 64 bytes buffer in four 16 byte updates).
There is no correctness checking of the result and all tests and
algorithms use the same input buffer.

Signed-off-by: Michal Ludvig &lt;michal@logix.cz&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Return -EAGAIN from module_init()</title>
<updated>2006-06-26T07:34:41Z</updated>
<author>
<name>Michal Ludvig</name>
<email>michal@logix.cz</email>
</author>
<published>2006-05-30T04:49:38Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=14fdf477a7e3ff54f8e67fe506dd2677a36c56e4'/>
<id>urn:sha1:14fdf477a7e3ff54f8e67fe506dd2677a36c56e4</id>
<content type='text'>
Intentionaly return -EAGAIN from module_init() to ensure
it doesn't stay loaded in the kernel.  The module does all
its work from init() and doesn't offer any runtime
functionality =&gt; we don't need it in the memory, do we?

Signed-off-by: Michal Ludvig &lt;michal@logix.cz&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
