Added support for SHA-3 algorithm test's
in tcrypt module and related test vectors.
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
---
crypto/tcrypt.c | 53 ++-
crypto/testmgr.c | 40 ++
crypto/testmgr.h
in place.
The patchset is based on v4.7-rc1 tag and its tested on
Broadcom NorthStar2 SoC.
Jeff Garzik (1):
Crypto: Add SHA-3 hash algorithm
Raveendra Padasalagi (1):
Crypto: Add SHA-3 Test's in tcrypt
crypto/Kconfig| 10 ++
crypto/Makefile | 1 +
crypto/sha3_generic.c | 296
: Jeff Garzik <jgar...@redhat.com>
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
---
crypto/Kconfig| 10 ++
crypto/Makefile | 1 +
crypto/sha3_generic.c | 296 ++
include/crypto/sha3.h | 29
Forgot to add Jeff Garzik in the email list.
++ Jeff Garzik.
Regards,
Raveendra
> -Original Message-
> From: Raveendra Padasalagi [mailto:raveendra.padasal...@broadcom.com]
> Sent: 15 June 2016 15:12
> To: Herbert Xu; David S. Miller; linux-crypto@vger.kernel.org;
Forgot to add Jeff Garzik in the email list.
++ Jeff Garzik.
Regards,
Raveendra
> -Original Message-
> From: Raveendra Padasalagi [mailto:raveendra.padasal...@broadcom.com]
> Sent: 15 June 2016 15:12
> To: Herbert Xu; David S. Miller; linux-crypto@vger.kernel.org;
The patch set can be fetched from iproc-sha3-v1 branch of
https://github.com/Broadcom/arm64-linux.git
Regards,
Raveendra
> -Original Message-
> From: Raveendra Padasalagi [mailto:raveendra.padasal...@broadcom.com]
> Sent: 15 June 2016 15:20
> To: 'Herbert Xu'; 'David S. Mil
> additional changes to match the padding rules specified
>> in SHA-3 specification.
>>
>> Signed-off-by: Jeff Garzik <jgar...@redhat.com>
>> Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
>> --
++ Stephan Mueller
Regards,
Raveendra
> -Original Message-
> From: Raveendra Padasalagi [mailto:raveendra.padasal...@broadcom.com]
> Sent: 17 June 2016 10:31
> To: Herbert Xu; David S. Miller; linux-crypto@vger.kernel.org; linux-
> ker...@vger.kernel.org
> Cc: Jon Mason
ntation,
as hardware implementation can use non zero value if it needs higher priority.
What's your opinion ?
Regards,
Raveendra
On Thu, Jun 16, 2016 at 9:10 PM, Stephan Mueller <smuel...@chronox.de> wrote:
> Am Donnerstag, 16. Juni 2016, 14:44:57 schrieb Raveendra Padasalagi:
cra_driver_name's
sha3-224-generic
sha3-256-generic
sha3-384-generic
sha3-512-generic
Jeff Garzik (1):
Crypto: Add SHA-3 hash algorithm
Raveendra Padasalagi (1):
Crypto: Add SHA-3 Test's in tcrypt
crypto/Kconfig| 10 ++
crypto/Makefile | 1 +
crypto/sha3_generic.c | 300
Added support for SHA-3 algorithm test's
in tcrypt module and related test vectors.
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
---
crypto/tcrypt.c | 53 ++-
crypto/testmgr.c | 40 ++
crypto/testmgr.h
This patch adds HMAC-SHA3 test modes in tcrypt module
and related test vectors.
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
---
crypto/tcrypt.c | 16 +++
crypto/testmgr.c | 40 ++
crypto/testmgr.h | 388
er")
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
Reviewed-by: Ray Jui <ray@broadcom.com>
Reviewed-by: Scott Branden <scott.bran...@broadcom.com>
Cc: sta...@vger.kernel.org
---
drivers/crypto/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
m SPU driver")
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
cc: sta...@vger.kernel.org
---
drivers/crypto/bcm/cipher.c | 105 +---
drivers/crypto/bcm/cipher.h | 15 ---
2 files changed, 57 insertions(+), 63 deletion
Need to address few issues in the patch.
So NAKing this patch. Will send out re-vised version.
Regards,
Raveendra
> -Original Message-
> From: Raveendra Padasalagi [mailto:raveendra.padasal...@broadcom.com]
> Sent: 13 July 2017 13:58
> To: Herbert Xu; David S. Miller; Rob
m SPU driver")
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
Reviewed-by: Scott Branden <scott.bran...@broadcom.com>
Reviewed-by: Florian Fainelli <f.faine...@gmail.com>
Cc: sta...@vger.kernel.org
---
Changes in v1:
- Added error path to clean up
In Broadcom SPU driver, due to missing break statement
in spu2_hash_xlate() while mapping SPU2 equivalent
SHA3-512 value, -EINVAL is chosen and hence leading to
failure of SHA3-512 algorithm. This patch fixes the same.
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.
Need to consider some more scenarios.
So NAKing this patch. Will send out re-vised version.
Regards,
Raveendra
On Fri, Jun 23, 2017 at 2:24 PM, Raveendra Padasalagi
<raveendra.padasal...@broadcom.com> wrote:
> Zero length payload requests are not handled in
> Broadcom SPU2 engine, s
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
Reviewed-by: Ray Jui <ray@broadcom.com>
Reviewed-by: Scott Branden <scott.bran...@broadcom.com>
Cc: sta...@vger.kernel.org
---
Changes in v1:
- Added Cc and fixes tag in the Signed-off area to send the patch
Zero length payload requests are not handled in
Broadcom SPU2 engine, so this patch adds conditional
check to fallback to software implementation for AES-GCM
and AES-CCM algorithms.
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
Reviewed-by: Ray Jui <ray@bro
Zero length payload requests are not handled in
Broadcom SPU2 engine, so this patch adds conditional
check to fallback to software implementation for AES-GCM
and AES-CCM algorithms.
Fixes: 9d12ba86f818 ("crypto: brcm - Add Broadcom SPU driver")
Signed-off-by: Raveendra
er")
Signed-off-by: Raveendra Padasalagi <raveendra.padasal...@broadcom.com>
Reviewed-by: Anup Patel <anup.pa...@broadcom.com>
Reviewed-by: Scott Branden <scott.bran...@broadcom.com>
Cc: sta...@vger.kernel.org
diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/
Hi Stefan,
The change looks to be fine. From the IP point of view its using the
same values in case of AES cipher and hash types so explicit casting
should be ok.
-Raveendra
On Sat, Mar 24, 2018 at 4:32 PM, Stefan Agner wrote:
> In the AES cases enum spu_cipher_type and enum
23 matches
Mail list logo