<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/crypto, branch v2.6.18</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/crypto?h=v2.6.18</id>
<link rel='self' href='https://git.amat.us/linux/atom/crypto?h=v2.6.18'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-06-26T07:34:42Z</updated>
<entry>
<title>[CRYPTO] tcrypt: Forbid tcrypt from being built-in</title>
<updated>2006-06-26T07:34:42Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-06-10T08:06:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b9d0a25a484a90c1d60b974d115eff2fe580ce16'/>
<id>urn:sha1:b9d0a25a484a90c1d60b974d115eff2fe580ce16</id>
<content type='text'>
It makes no sense to build tcrypt into the kernel.  In fact, now that
the driver init function's return status is being checked, it is in
fact harmful to do so.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Speed benchmark support for digest algorithms</title>
<updated>2006-06-26T07:34:41Z</updated>
<author>
<name>Michal Ludvig</name>
<email>michal@logix.cz</email>
</author>
<published>2006-05-30T12:04:19Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e805792851bcb0bb42f0c8a352be64564c13e374'/>
<id>urn:sha1:e805792851bcb0bb42f0c8a352be64564c13e374</id>
<content type='text'>
This patch adds speed tests (benchmarks) for digest algorithms.
Tests are run with different buffer sizes (16 bytes, ... 8 kBytes)
and with each buffer multiple tests are run with different update()
sizes (e.g. hash 64 bytes buffer in four 16 byte updates).
There is no correctness checking of the result and all tests and
algorithms use the same input buffer.

Signed-off-by: Michal Ludvig &lt;michal@logix.cz&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] tcrypt: Return -EAGAIN from module_init()</title>
<updated>2006-06-26T07:34:41Z</updated>
<author>
<name>Michal Ludvig</name>
<email>michal@logix.cz</email>
</author>
<published>2006-05-30T04:49:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=14fdf477a7e3ff54f8e67fe506dd2677a36c56e4'/>
<id>urn:sha1:14fdf477a7e3ff54f8e67fe506dd2677a36c56e4</id>
<content type='text'>
Intentionaly return -EAGAIN from module_init() to ensure
it doesn't stay loaded in the kernel.  The module does all
its work from init() and doesn't offer any runtime
functionality =&gt; we don't need it in the memory, do we?

Signed-off-by: Michal Ludvig &lt;michal@logix.cz&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] api: Allow replacement when registering new algorithms</title>
<updated>2006-06-26T07:34:41Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-05-21T01:57:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=996e2523cc347cc98237d2da3454aedc779fdcba'/>
<id>urn:sha1:996e2523cc347cc98237d2da3454aedc779fdcba</id>
<content type='text'>
We already allow asynchronous removal of existing algorithm modules.  By
allowing the replacement of existing algorithms, we can replace algorithms
without having to wait for for all existing users to complete.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] api: Removed const from cra_name/cra_driver_name</title>
<updated>2006-06-26T07:34:40Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-05-20T22:45:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d913ea0d6b6a48dd6eed8fc5e299b8b10e049186'/>
<id>urn:sha1:d913ea0d6b6a48dd6eed8fc5e299b8b10e049186</id>
<content type='text'>
We do need to change these names now and even more so in future with
instantiated algorithms.  So let's stop lying to the compiler and get
rid of the const modifiers.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] api: Added cra_init/cra_exit</title>
<updated>2006-06-26T07:34:40Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-05-24T03:02:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c7fc05992afcf1d63d6d5fb6142c8d39094dbca9'/>
<id>urn:sha1:c7fc05992afcf1d63d6d5fb6142c8d39094dbca9</id>
<content type='text'>
This patch adds the hooks cra_init/cra_exit which are called during a tfm's
construction and destruction respectively.  This will be used by the instances
to allocate child tfm's.

For now this lets us get rid of the coa_init/coa_exit functions which are
used for exactly that purpose (unlike the dia_init function which is called
for each transaction).

In fact the coa_exit path is currently buggy as it may get called twice
when an error is encountered during initialisation.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] api: Fixed incorrect passing of context instead of tfm</title>
<updated>2006-06-26T07:34:40Z</updated>
<author>
<name>Michal Ludvig</name>
<email>michal@logix.cz</email>
</author>
<published>2006-05-21T22:28:06Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=110bf1c0e932615cbe43a8af8a07bc3750ae4295'/>
<id>urn:sha1:110bf1c0e932615cbe43a8af8a07bc3750ae4295</id>
<content type='text'>
Fix a few omissions in passing TFM instead of CTX to algorithms.

Signed-off-by: Michal Ludvig &lt;michal@logix.cz&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] all: Pass tfm instead of ctx to algorithms</title>
<updated>2006-06-26T07:34:39Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-05-16T12:09:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6c2bb98bc33ae33c7a33a133a4cd5a06395fece5'/>
<id>urn:sha1:6c2bb98bc33ae33c7a33a133a4cd5a06395fece5</id>
<content type='text'>
Up until now algorithms have been happy to get a context pointer since
they know everything that's in the tfm already (e.g., alignment, block
size).

However, once we have parameterised algorithms, such information will
be specific to each tfm.  So the algorithm API needs to be changed to
pass the tfm structure instead of the context pointer.

This patch is basically a text substitution.  The only tricky bit is
the assembly routines that need to get the context pointer offset
through asm-offsets.h.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] digest: Remove unnecessary zeroing during init</title>
<updated>2006-06-26T07:34:38Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-05-16T12:06:54Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=43600106e32809a4dead79fec67a63e9860e3d5d'/>
<id>urn:sha1:43600106e32809a4dead79fec67a63e9860e3d5d</id>
<content type='text'>
Various digest algorithms operate one block at a time and therefore
keep a temporary buffer of partial blocks.  This buffer does not need
to be initialised since there is a counter which indicates what is and
isn't valid in it.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[CRYPTO] digest: Add alignment handling</title>
<updated>2006-06-26T07:34:38Z</updated>
<author>
<name>Atsushi Nemoto</name>
<email>anemo@mba.ocn.ne.jp</email>
</author>
<published>2006-04-09T22:42:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e1147d8f47eb8fef93f98a30858192145137d2b2'/>
<id>urn:sha1:e1147d8f47eb8fef93f98a30858192145137d2b2</id>
<content type='text'>
Some hash modules load/store data words directly.  The digest layer
should pass properly aligned buffer to update()/final() method.  This
patch also add cra_alignmask to some hash modules.

Signed-off-by: Atsushi Nemoto &lt;anemo@mba.ocn.ne.jp&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
