This implementation keeps the 64 bytes of workspace in registers rather than
on the stack, eliminating most of the loads and stores, and reducing the
instruction count by about 25%.
Signed-off-by: Ard Biesheuvel ard.biesheu...@linaro.org
---
Hello all,
No performance numbers I am allowed to
Add support for the following combinations:
-encryption: null
-authentication: md5, sha* (1, 224, 256, 384, 512)
Signed-off-by: Tudor Ambarus tudor.amba...@freescale.com
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 327
These defines might be needed by crypto drivers.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/crypto_null.c | 6 +-
include/crypto/null.h | 11 +++
2 files changed, 12 insertions(+), 5 deletions(-)
create mode 100644 include/crypto/null.h
diff --git
Commit 61bb86bba169507a5f223b94b9176c32c84b4721
(crypto: caam - set descriptor sharing type to SERIAL)
changed the descriptor sharing mode from SHARE_WAIT to SHARE_SERIAL.
All descriptor commands that handle the ok to share and
error propagation settings should also go away, since they have no
Add test vectors for aead with null encryption and md5,
respectively sha1 authentication.
Input data is taken from test vectors listed in RFC2410.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
crypto/tcrypt.c | 8 +++
crypto/testmgr.c | 32 ++
crypto/testmgr.h | 180
(struct caam_ctx) ctx-key_dma needs to be unmapped
when context is cleaned up.
Signed-off-by: Horia Geanta horia.gea...@freescale.com
---
drivers/crypto/caam/caamalg.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c
index
I see the algif_hash and algif_blkcipher implementations to allow
userspace AF_ALG socket access to kernel blkcipher and hash
algorithms, but has anyone done a algif_compression to allow userspace
access to compression algs? I'm asking specifically wrt the 842
crypto module, which uses the