<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/crypto/tcrypt.h, branch tmp/leds/core</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=tmp%2Fleds%2Fcore</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=tmp%2Fleds%2Fcore'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2008-08-29T05:49:55Z</updated>
<entry>
<title>crypto: cryptomgr - Add test infrastructure</title>
<updated>2008-08-29T05:49:55Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2008-07-31T09:08:25Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=da7f033ddc9fdebb3223b0bf88a2a2ab5b797608'/>
<id>urn:sha1:da7f033ddc9fdebb3223b0bf88a2a2ab5b797608</id>
<content type='text'>
This patch moves the newly created alg_test infrastructure into
cryptomgr.  This shall allow us to use it for testing at algorithm
registrations.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: tcrypt - Avoid using contiguous pages</title>
<updated>2008-08-29T05:48:57Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2008-07-31T04:23:53Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=f139cfa7cdccd0b315fad098889897b5fcd389b0'/>
<id>urn:sha1:f139cfa7cdccd0b315fad098889897b5fcd389b0</id>
<content type='text'>
If tcrypt is to be used as a run-time integrity test, it needs to be
more resilient in a hostile environment.  For a start allocating 32K
of physically contiguous memory is definitely out.

This patch teaches it to use separate pages instead.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Add self test for des3_ebe cipher operating in cbc mode</title>
<updated>2008-07-10T12:35:16Z</updated>
<author>
<name>Neil Horman</name>
<email>nhorman@tuxdriver.com</email>
</author>
<published>2008-06-03T10:00:16Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d729de23e86bbbb28adf6c3ded3651ea4ad8c539'/>
<id>urn:sha1:d729de23e86bbbb28adf6c3ded3651ea4ad8c539</id>
<content type='text'>
Patch to add checking  of DES3 test vectors using CBC mode.  FIPS-140-2
compliance mandates that any supported mode of operation must include a self
test.  This satisfies that requirement for cbc(des3_ede).  The included test
vector was generated by me using openssl.  Key/IV was generated with the
following command:

	openssl enc -des_ede_cbc -P

input and output values were generated by repeating the string "Too many
secrets" a few times over, truncating it to 128 bytes, and encrypting it with
openssl using the aformentioned key.  Tested successfully by myself

Signed-off-by: Neil Horman &lt;nhorman@tuxdriver.com&gt;
Acked-by: Adrian-Ken Rueegsegger &lt;rueegsegger@swiss-it.ch&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Add test vectors for RIPEMD-256 and RIPEMD-320</title>
<updated>2008-07-10T12:35:13Z</updated>
<author>
<name>Adrian-Ken Rueegsegger</name>
<email>rueegsegger@swiss-it.ch</email>
</author>
<published>2008-05-09T13:29:35Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=2998db37b5c62890ff1a0d48abd76ada13ebc554'/>
<id>urn:sha1:2998db37b5c62890ff1a0d48abd76ada13ebc554</id>
<content type='text'>
This patch adds test vectors for RIPEMD-256 and
RIPEMD-320 hash algorithms.

The test vectors are taken from
&lt;http://homes.esat.kuleuven.be/~bosselae/ripemd160.html&gt;

Signed-off-by: Adrian-Ken Rueegsegger &lt;rueegsegger@swiss-it.ch&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrpyt: Get rid of change log in source</title>
<updated>2008-07-10T12:35:10Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2008-05-07T14:19:38Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b10c170638c1f75bf582a75442fcdf27057ff537'/>
<id>urn:sha1:b10c170638c1f75bf582a75442fcdf27057ff537</id>
<content type='text'>
Change logs should be kept in source control systems, not the source.
This patch removes the change log from tcrpyt to stop people from
extending it any more.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Add test vectors for RIPEMD-128 and RIPEMD-160</title>
<updated>2008-07-10T12:35:10Z</updated>
<author>
<name>Adrian-Ken Rueegsegger</name>
<email>rueegsegger@swiss-it.ch</email>
</author>
<published>2008-05-07T14:16:36Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=fd4adf1a0b1923f6126835e1097b2997eb0d27e2'/>
<id>urn:sha1:fd4adf1a0b1923f6126835e1097b2997eb0d27e2</id>
<content type='text'>
This patch adds test vectors for RIPEMD-128 and
RIPEMD-160 hash algorithms and digests (HMAC).

The test vectors are taken from ISO:IEC 10118-3 (2004)
and RFC2286.

Signed-off-by: Adrian-Ken Rueegsegger &lt;rueegsegger@swiss-it.ch&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] cts: Add CTS mode required for Kerberos AES support</title>
<updated>2008-04-21T02:19:23Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2008-03-24T13:26:16Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=76cb9521795a167ae3d206343c072f602d84f815'/>
<id>urn:sha1:76cb9521795a167ae3d206343c072f602d84f815</id>
<content type='text'>
Implement CTS wrapper for CBC mode required for support of AES
encryption support for Kerberos (rfc3962).

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Change the XTEA test vectors</title>
<updated>2008-04-21T02:19:22Z</updated>
<author>
<name>Sebastian Siewior</name>
<email>sebastian@breakpoint.cc</email>
</author>
<published>2008-03-13T12:29:07Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=f0df30b1f7f2bf8588613b2c012b8859b06849f1'/>
<id>urn:sha1:f0df30b1f7f2bf8588613b2c012b8859b06849f1</id>
<content type='text'>
The third test vector of ECB-XTEA-ENC fails for me all other
are fine. I could not find a RFC or something else where they
are defined. The test vector has not been modified since git
started recording histrory. The implementation is very close
(not to say equal) to what is available as Public Domain (they
recommend 64 rounds and the in kernel uses 32). Therefore I
belive that there is typo somewhere and tcrypt reported always
*fail* instead of *okey*.
This patch replaces input + result of the third test vector with
result + input from the third decryption vector. The key is the
same, the other three test vectors are also the reverse.

Signed-off-by: Sebastian Siewior &lt;sebastian@breakpoint.cc&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Shrink the tcrypt module</title>
<updated>2008-04-21T02:19:22Z</updated>
<author>
<name>Sebastian Siewior</name>
<email>sebastian@breakpoint.cc</email>
</author>
<published>2008-03-13T12:21:51Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=de224c309b5631bdaae3fcd6880cfb93b52f5a53'/>
<id>urn:sha1:de224c309b5631bdaae3fcd6880cfb93b52f5a53</id>
<content type='text'>
Currently the tcrypt module is about 2 MiB on x86-32. The
main reason for the huge size is the data segment which contains
all the test vectors for each algorithm. The test vectors are
staticly allocated in an array and the size of the array has been
drastically increased by the merge of the Salsa20 test vectors.

With a hint from Benedigt Spranger I found a way how I could
convert those fixed-length arrays to strings which are flexible
in size. VIM and regex were also very helpfull :)
So, I am talking about a shrinking of ~97% on x86-32:

   text    data     bss     dec     hex filename
  18309 2039708      20 2058037  1f6735 tcrypt-b4.ko
  45628   23516      80   69224   10e68 tcrypt.ko

Signed-off-by: Sebastian Siewior &lt;sebastian@breakpoint.cc&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Shrink speed templates</title>
<updated>2008-04-21T02:19:21Z</updated>
<author>
<name>Sebastian Siewior</name>
<email>sebastian@breakpoint.cc</email>
</author>
<published>2008-03-11T13:27:11Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d5dc392742a9818e2766a63f3533980543e18060'/>
<id>urn:sha1:d5dc392742a9818e2766a63f3533980543e18060</id>
<content type='text'>
The speed templates as it look always the same. The key size
is repeated for each block size and we test always the same
block size. The addition of one inner loop makes it possible
to get rid of the struct and it is possible to use a tiny
u8 array :)

Signed-off-by: Sebastian Siewior &lt;sebastian@breakpoint.cc&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
