On Fri, Nov 19, 2010 at 05:51:36PM +0800, Herbert Xu wrote:
Miroslave found quite a few more problems with the patch-set
so here is another revision with those problems resolved:
OK two more bugs found and fixed so here is one more revision:
* If recvmsg leaves bytes behind in the last SG
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no
On Mon, Nov 15, 2010 at 03:55:49PM +0100, Martin Willi wrote:
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
I can confirm that the newest patch fixes the page leak.
Tested-by: Martin Willi mar...@strongswan.org
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no
On Mon, Nov 08, 2010 at 10:10:20AM +0100, Martin Willi wrote:
The test program below runs 1000 encryptions:
# grep nr_free /proc/vmstat
nr_free_pages 11031
# ./test
Thanks, Miroslav identified a bogosity where if we're not doing
a whole page then the last sgl pointer is off by one which
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
I can confirm that the newest patch fixes the page leak.
Tested-by: Martin Willi mar...@strongswan.org
--
To unsubscribe from this list: send the line unsubscribe linux-crypto
Hmm, can you show me your test program and how you determined
that it was leaking pages?
The test program below runs 1000 encryptions:
# grep nr_free /proc/vmstat
nr_free_pages 11031
# ./test
...
# grep nr_free /proc/vmstat
nr_free_pages 10026
# ./test
...
# grep nr_free /proc/vmstat
Hi Herbert,
I did a proof-of-concept implementation for our crypto library, the
interface looks good so far. All our hash, hmac, xcbc and cipher test
vectors matched.
+ sg_assign_page(sg + i, alloc_page(GFP_KERNEL));
Every skcipher operation leaks memory on my box (this
Martin Willi mar...@strongswan.org wrote:
Hi Herbert,
I did a proof-of-concept implementation for our crypto library, the
interface looks good so far. All our hash, hmac, xcbc and cipher test
vectors matched.
+ sg_assign_page(sg + i, alloc_page(GFP_KERNEL));
Every
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.
Keys can optionally be set through the setsockopt interface.
Once a sendmsg call occurs without MSG_MORE no
12 matches
Mail list logo