<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/crypto/Makefile, branch v3.3</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/crypto/Makefile?h=v3.3</id>
<link rel='self' href='https://git.amat.us/linux/atom/crypto/Makefile?h=v3.3'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-11-30T08:12:44Z</updated>
<entry>
<title>crypto: serpent - rename serpent.c to serpent_generic.c</title>
<updated>2011-11-30T08:12:44Z</updated>
<author>
<name>Jussi Kivilinna</name>
<email>jussi.kivilinna@mbnet.fi</email>
</author>
<published>2011-11-23T10:21:06Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2deed786d99390d5abe06a2a300d0643305bffcb'/>
<id>urn:sha1:2deed786d99390d5abe06a2a300d0643305bffcb</id>
<content type='text'>
Now that serpent.c has been cleaned from checkpatch warnings,
we can do clean rename.

Signed-off-by: Jussi Kivilinna &lt;jussi.kivilinna@mbnet.fi&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: serpent - rename module from serpent to serpent_generic</title>
<updated>2011-11-09T03:43:00Z</updated>
<author>
<name>Jussi Kivilinna</name>
<email>jussi.kivilinna@mbnet.fi</email>
</author>
<published>2011-10-17T21:03:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=dd6eec242bb2df73743f07535d2bacd6707c6300'/>
<id>urn:sha1:dd6eec242bb2df73743f07535d2bacd6707c6300</id>
<content type='text'>
Rename module from serpent.ko to serpent_generic.ko and add module alias. This
is to allow assembler implementation to autoload on 'modprobe serpent'. Also
add driver_name and priority for serpent cipher.

CC: Dag Arne Osvik &lt;osvik@ii.uib.no&gt;
Signed-off-by: Jussi Kivilinna &lt;jussi.kivilinna@mbnet.fi&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: Add userspace configuration API</title>
<updated>2011-10-21T12:24:03Z</updated>
<author>
<name>Steffen Klassert</name>
<email>steffen.klassert@secunet.com</email>
</author>
<published>2011-09-27T05:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a38f7907b926e4c6c7d389ad96cc38cec2e5a9e9'/>
<id>urn:sha1:a38f7907b926e4c6c7d389ad96cc38cec2e5a9e9</id>
<content type='text'>
This patch adds a basic userspace configuration API for the crypto layer.
With this it is possible to instantiate, remove and to show crypto
algorithms from userspace.

Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: blowfish - rename C-version to blowfish_generic</title>
<updated>2011-09-22T11:25:26Z</updated>
<author>
<name>Jussi Kivilinna</name>
<email>jussi.kivilinna@mbnet.fi</email>
</author>
<published>2011-09-01T22:45:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3f2a5d2d42e0784b6aa96c2e5dcdd64e28e838d6'/>
<id>urn:sha1:3f2a5d2d42e0784b6aa96c2e5dcdd64e28e838d6</id>
<content type='text'>
Rename blowfish to blowfish_generic so that assembler versions of blowfish
cipher can autoload. Module alias 'blowfish' is added.

Also fix checkpatch warnings.

Signed-off-by: Jussi Kivilinna &lt;jussi.kivilinna@mbnet.fi&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: blowfish - split generic and common c code</title>
<updated>2011-09-22T11:25:25Z</updated>
<author>
<name>Jussi Kivilinna</name>
<email>jussi.kivilinna@mbnet.fi</email>
</author>
<published>2011-09-01T22:45:07Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=52ba867c8c23dcb24865f80a95c191501e101b9f'/>
<id>urn:sha1:52ba867c8c23dcb24865f80a95c191501e101b9f</id>
<content type='text'>
Patch splits up the blowfish crypto routine into a common part (key setup)
which will be used by blowfish crypto modules (x86_64 assembly and generic-c).

Also fixes errors/warnings reported by checkpatch.

Signed-off-by: Jussi Kivilinna &lt;jussi.kivilinna@mbnet.fi&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers</title>
<updated>2011-03-14T03:22:27Z</updated>
<author>
<name>Steffen Klassert</name>
<email>steffen.klassert@secunet.com</email>
</author>
<published>2011-03-08T00:04:58Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a5079d084f8be781aae8a635cab4b179cfea4ebd'/>
<id>urn:sha1:a5079d084f8be781aae8a635cab4b179cfea4ebd</id>
<content type='text'>
ESP with separate encryption/authentication algorithms needs a special
treatment for the associated data. This patch add a new algorithm that
handles esp with extended sequence numbers.

Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Acked-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>crypto: Makefile clean up</title>
<updated>2010-11-27T08:32:57Z</updated>
<author>
<name>Tracey Dent</name>
<email>tdent48227@gmail.com</email>
</author>
<published>2010-11-27T08:32:57Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=21ea28abcf825729f9698afd7357dfbf7040d4f8'/>
<id>urn:sha1:21ea28abcf825729f9698afd7357dfbf7040d4f8</id>
<content type='text'>
Changed Makefile to use &lt;modules&gt;-y instead of &lt;modules&gt;-objs.

Signed-off-by: Tracey Dent &lt;tdent48227@gmail.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: algif_skcipher - User-space interface for skcipher operations</title>
<updated>2010-11-26T12:53:59Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2010-10-19T13:31:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8ff590903d5fc7f5a0a988c38267a3d08e6393a2'/>
<id>urn:sha1:8ff590903d5fc7f5a0a988c38267a3d08e6393a2</id>
<content type='text'>
This patch adds the af_alg plugin for symmetric key ciphers,
corresponding to the ablkcipher kernel operation type.

Keys can optionally be set through the setsockopt interface.

Once a sendmsg call occurs without MSG_MORE no further writes
may be made to the socket until all previous data has been read.

IVs and and whether encryption/decryption is performed can be
set through the setsockopt interface or as a control message
to sendmsg.

The interface is completely synchronous, all operations are
carried out in recvmsg(2) and will complete prior to the system
call returning.

The splice(2) interface support reading the user-space data directly
without copying (except that the Crypto API itself may copy the data
if alignment is off).

The recvmsg(2) interface supports directly writing to user-space
without additional copying, i.e., the kernel crypto interface will
receive the user-space address as its output SG list.

Thakns to Miloslav Trmac for reviewing this and contributing
fixes and improvements.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>crypto: algif_hash - User-space interface for hash operations</title>
<updated>2010-11-19T09:47:58Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2010-10-19T13:23:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fe869cdb89c95d060c77eea20204d6c91f233b53'/>
<id>urn:sha1:fe869cdb89c95d060c77eea20204d6c91f233b53</id>
<content type='text'>
This patch adds the af_alg plugin for hash, corresponding to
the ahash kernel operation type.

Keys can optionally be set through the setsockopt interface.

Each sendmsg call will finalise the hash unless sent with a MSG_MORE
flag.

Partial hash states can be cloned using accept(2).

The interface is completely synchronous, all operations will
complete prior to the system call returning.

Both sendmsg(2) and splice(2) support reading the user-space
data directly without copying (except that the Crypto API itself
may copy the data if alignment is off).

For now only the splice(2) interface supports performing digest
instead of init/update/final.  In future the sendmsg(2) interface
will also be modified to use digest/finup where possible so that
hardware that cannot return a partial hash state can still benefit
from this interface.

Thakns to Miloslav Trmac for reviewing this and contributing
fixes and improvements.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: David S. Miller &lt;davem@davemloft.net&gt;
Tested-by: Martin Willi &lt;martin@strongswan.org&gt;
</content>
</entry>
<entry>
<title>crypto: af_alg - User-space interface for Crypto API</title>
<updated>2010-11-19T09:47:57Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2010-10-19T13:12:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=03c8efc1ffeb6b82a22c1af8dd908af349563314'/>
<id>urn:sha1:03c8efc1ffeb6b82a22c1af8dd908af349563314</id>
<content type='text'>
This patch creates the backbone of the user-space interface for
the Crypto API, through a new socket family AF_ALG.

Each session corresponds to one or more connections obtained from
that socket.  The number depends on the number of inputs/outputs
of that particular type of operation.  For most types there will
be a s ingle connection/file descriptor that is used for both input
and output.  AEAD is one of the few that require two inputs.

Each algorithm type will provide its own implementation that plugs
into af_alg.  They're keyed using a string such as "skcipher" or
"hash".

IOW this patch only contains the boring bits that is required
to hold everything together.

Thakns to Miloslav Trmac for reviewing this and contributing
fixes and improvements.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: David S. Miller &lt;davem@davemloft.net&gt;
Tested-by: Martin Willi &lt;martin@strongswan.org&gt;
</content>
</entry>
</feed>
