On Wed, Apr 25, 2018 at 8:49 PM, Eric Biggers wrote:
> I agree that my explanation should have been better, and should have
> considered
> more crypto algorithms. The main difficulty is that we have extreme
> performance
> requirements -- it needs to be 50 MB/s at the very
Hi Samuel,
On Wed, Apr 25, 2018 at 03:33:16PM +0100, Samuel Neves wrote:
> Let's put the provenance of Speck aside for a moment, and suppose that
> it is an ideal block cipher. There are still some issues with this
> patch as it stands.
>
> - The rationale seems off. Consider this bit from the
Hi, Gilad,
On 04/23/2018 10:25 AM, Gilad Ben-Yossef wrote:
Enable CryptoCell support for hardware keys.
Hardware keys are regular AES keys loaded into CryptoCell internal memory
via firmware, often from secure boot ROM or hardware fuses at boot time.
As such, they can be used for enc/dec
> -Original Message-
> From: Eric Biggers
> Sent: Tuesday, 27 March 2018 9:55
> To: Yael Chemla
> Cc: Alasdair Kergon ; Mike Snitzer ;
> dm-de...@redhat.com; linux-ker...@vger.kernel.org;
some of the supported socket options are sent to HW while rest
are handled by SW
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls.h | 10 ++
drivers/crypto/chelsio/chtls/chtls_cm.h | 12 ++
drivers/crypto/chelsio/chtls/chtls_hw.c | 2 +-
removed redundant check and made TLS PDU and header recv
handling common as received from HW
Signed-off-by: Atul Gupta
Signed-off-by: Harsh Jain
---
drivers/crypto/chelsio/chtls/chtls.h| 10 ++
drivers/crypto/chelsio/chtls/chtls_cm.c | 12
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_main.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/chelsio/chtls/chtls_main.c
- unindented continue
- check for null page
- signed return
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_io.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git
corrected the key length to copy 128b key. Removed 192b and 256b
key as user input supports key of size 128b in gcm_ctx
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_hw.c | 6 +-
1 file changed,
skb dereferenced before check in sendpage
Reported-by: Dan Carpenter
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls_io.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git
wait for memory in sendmsg and sendpage
Reported-by: Gustavo A. R. Silva
Signed-off-by: Atul Gupta
---
drivers/crypto/chelsio/chtls/chtls.h | 1 +
drivers/crypto/chelsio/chtls/chtls_io.c | 90 +--
Let's put the provenance of Speck aside for a moment, and suppose that
it is an ideal block cipher. There are still some issues with this
patch as it stands.
- The rationale seems off. Consider this bit from the commit message:
> Other AES alternatives such as Twofish, Threefish, Camellia,
On Wed, Apr 25, 2018 at 3:20 PM, Ard Biesheuvel
wrote:
> In preparation of adding support for the SIMD based arm64 implementation
> of arm64, which requires a fallback to non-SIMD code when invoked in
> certain contexts, expose the generic SM4 encrypt and decrypt
On 25 April 2018 at 14:20, Ard Biesheuvel wrote:
> In preparation of adding support for the SIMD based arm64 implementation
> of arm64,
SM4 ^^^
> which requires a fallback to non-SIMD code when invoked in
> certain contexts, expose the generic SM4 encrypt and decrypt
In preparation of adding support for the SIMD based arm64 implementation
of arm64, which requires a fallback to non-SIMD code when invoked in
certain contexts, expose the generic SM4 encrypt and decrypt routines
to other drivers.
Signed-off-by: Ard Biesheuvel
---
Add support for the SM4 symmetric cipher implemented using the special
SM4 instructions introduced in ARM architecture revision 8.2.
Signed-off-by: Ard Biesheuvel
---
arch/arm64/crypto/Kconfig | 6 ++
arch/arm64/crypto/Makefile | 3 +
Patch #1 makes some preparatory changes so the C routines can be used as
a fallback by other drivers.
Patch #2 implements the SM4 core cipher using the special instructions
introduced as an optional extension by revision 8.2 of the ARM architecture.
Note that this does not implement
17 matches
Mail list logo