Fabio Estevam writes:
Hi,
> On Thu, Feb 21, 2013 at 1:40 PM, Arnaud Patard
> wrote:
>
>> How different are the variants ? I've a imx51 device with DT support so
>> if someone running sahara on a system with DT is needed, I can be this
>> person (as long as a way to test it is provided too).
>
>
On Thu, Feb 21, 2013 at 12:46:45PM -0500, Sandy Harris wrote:
>
> Also, in some designs it is possible to get very close to calculating
> entropy. The Turbid generator, for example, uses physical measurements
> of sound card properties plus arguments from standard circuit physics to
> prove a lowe
Herbert,
The following patch update the stale link to the CRC32C white paper
that was referenced.
Tim
Signed-off-by: Tim Chen
---
arch/x86/crypto/crc32c-pcl-intel-asm_64.S |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/x86/crypto/crc32c-pcl-intel-asm_64.S
On Thu, Feb 21, 2013 at 9:17 AM, Stephan Mueller wrote:
> There is no state between calls. Of course, you need a scratchpad to do
> calculations.
But in general you need a buffer. It is quite easy to construct scenarios where
several K bits of entropy are needed very -- for example, reboot an IP
Fabio Estevam writes:
Hi,
> On Thu, Feb 21, 2013 at 12:23 PM, Sascha Hauer wrote:
>
>> Neither i.MX25, i.MX31 nor i.MX21 have this unit. I haven't checked the
>> others, but I assume this is i.MX27 only.
>
> There is Sahara variants on mx51/mx53.
How different are the variants ? I've a imx51 de
On Thu, Feb 21, 2013 at 1:40 PM, Arnaud Patard
wrote:
> How different are the variants ? I've a imx51 device with DT support so
> if someone running sahara on a system with DT is needed, I can be this
> person (as long as a way to test it is provided too).
mx27 has Saharav2, mx51 has Saharav4. I
On Thu, Feb 21, 2013 at 12:23 PM, Sascha Hauer wrote:
> Neither i.MX25, i.MX31 nor i.MX21 have this unit. I haven't checked the
> others, but I assume this is i.MX27 only.
There is Sahara variants on mx51/mx53.
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the bod
On Thu, Feb 21, 2013 at 02:40:59PM +, Arnd Bergmann wrote:
> On Thursday 21 February 2013, javier Martin wrote:
> > We know about the existence of DT and the constant migration process
> > that is taking place towards it.
> >
> > Moreover we are strongly interested in converting the Visstrim S
On 21 February 2013 16:18, Sascha Hauer wrote:
> On Thu, Feb 21, 2013 at 03:18:36PM +0100, javier Martin wrote:
>> Hi Arnd,
>>
>> On 21 February 2013 13:59, Arnd Bergmann wrote:
>> > On Thursday 21 February 2013, Javier Martin wrote:
>> >> This series of patches provide AES-ECB and AES-CBC suppor
On Thu, Feb 21, 2013 at 03:18:36PM +0100, javier Martin wrote:
> Hi Arnd,
>
> On 21 February 2013 13:59, Arnd Bergmann wrote:
> > On Thursday 21 February 2013, Javier Martin wrote:
> >> This series of patches provide AES-ECB and AES-CBC support
> >> for the SAHARA2 cryptographic accelerator which
On 21 February 2013 15:40, Arnd Bergmann wrote:
> On Thursday 21 February 2013, javier Martin wrote:
>> We know about the existence of DT and the constant migration process
>> that is taking place towards it.
>>
>> Moreover we are strongly interested in converting the Visstrim SM10
>> platform to
On Thursday 21 February 2013, javier Martin wrote:
> We know about the existence of DT and the constant migration process
> that is taking place towards it.
>
> Moreover we are strongly interested in converting the Visstrim SM10
> platform to DT. Unfortunately, there are several issues that need t
Hi Arnd,
thanks for your review.
On 21 February 2013 14:13, Arnd Bergmann wrote:
> On Thursday 21 February 2013, Javier Martin wrote:
>> +
>> +struct sahara_dev {
>> + struct device *device;
>> + void __iomem*regs_base;
>> + struct clk *clk_ipg;
>> +
On 21.02.2013 15:07:12, +0100, Phil Carmody wrote:
Hi Phil,
> Apologies if this is misthreaded, I had to hand-craft the headers.
>
>> The patch offers an entropy generator based on CPU timing jitter. The
>> entropy collector has the following properties:
>>
>> * it does not maintain any state an
Hi Arnd,
On 21 February 2013 13:59, Arnd Bergmann wrote:
> On Thursday 21 February 2013, Javier Martin wrote:
>> This series of patches provide AES-ECB and AES-CBC support
>> for the SAHARA2 cryptographic accelerator which is inside the i.MX27 SoC.
>> It is expected that more algorithms will be s
Apologies if this is misthreaded, I had to hand-craft the headers.
> The patch offers an entropy generator based on CPU timing jitter. The
> entropy collector has the following properties:
>
> * it does not maintain any state and therefore does not need any seed
What is this "pool" if it's not
On Thursday 21 February 2013, Javier Martin wrote:
> +
> +struct sahara_dev {
> + struct device *device;
> + void __iomem*regs_base;
> + struct clk *clk_ipg;
> + struct clk *clk_ahb;
> +
> + struct sahara_ctx *ctx;
> + sp
On Thursday 21 February 2013, Javier Martin wrote:
> This series of patches provide AES-ECB and AES-CBC support
> for the SAHARA2 cryptographic accelerator which is inside the i.MX27 SoC.
> It is expected that more algorithms will be supported in the future.
>
> For testing, a Visstrim M10 board h
SAHARA2 HW module is included in the i.MX27 SoC from
Freescale. It is capable of performing cipher algorithms
such as AES, 3DES..., hashing and RNG too.
This driver provides support for AES-CBC and AES-ECB
by now.
Signed-off-by: Javier Martin
---
drivers/crypto/Kconfig | 10 +
drivers/crypto
Signed-off-by: Javier Martin
---
arch/arm/mach-imx/Kconfig |1 +
arch/arm/mach-imx/mach-imx27_visstrim_m10.c |1 +
2 files changed, 2 insertions(+)
diff --git a/arch/arm/mach-imx/Kconfig b/arch/arm/mach-imx/Kconfig
index 1ad0d76..d232a56 100644
--- a/arch/arm/mach-imx/
i.MX27 devices include this HW cryptographic
accelerator.
Signed-off-by: Javier Martin
---
arch/arm/mach-imx/clk-imx27.c |2 ++
arch/arm/mach-imx/devices-imx27.h |4 +++
arch/arm/mach-imx/devices/Kconfig |4 +++
arch/arm/mach-imx/de
This series of patches provide AES-ECB and AES-CBC support
for the SAHARA2 cryptographic accelerator which is inside the i.MX27 SoC.
It is expected that more algorithms will be supported in the future.
For testing, a Visstrim M10 board has been used and the code related
to this platform has been i
22 matches
Mail list logo