Skip to content
Snippets Groups Projects
This project is mirrored from https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git. Pull mirroring updated .
  1. Oct 10, 2007
    • Herbert Xu's avatar
      [CRYPTO] blkcipher: Remove alignment restriction on block size · 70613783
      Herbert Xu authored
      
      Previously we assumed for convenience that the block size is a multiple of
      the algorithm's required alignment.  With the pending addition of CTR this
      will no longer be the case as the block size will be 1 due to it being a
      stream cipher.  However, the alignment requirement will be that of the
      underlying implementation which will most likely be greater than 1.
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      70613783
    • Herbert Xu's avatar
      [CRYPTO] aead: Add authenc · 3c09f17c
      Herbert Xu authored
      
      This patch adds the authenc algorithm which constructs an AEAD algorithm
      from an asynchronous block cipher and a hash.  The construction is done
      by concatenating the encrypted result from the cipher with the output
      from the hash, as is used by the IPsec ESP protocol.
      
      The authenc algorithm exists as a template with four parameters:
      
      	authenc(auth, authsize, enc, enckeylen).
      
      The authentication algorithm, the authentication size (i.e., truncating
      the output of the authentication algorithm), the encryption algorithm,
      and the encryption key length.  Both the size field and the key length
      field are in bytes.  For example, AES-128 with SHA1-HMAC would be
      represented by
      
      	authenc(hmac(sha1), 12, cbc(aes), 16)
      
      The key for the authenc algorithm is the concatenation of the keys for
      the authentication algorithm with the encryption algorithm.  For the
      above example, if a key of length 36 bytes is given, then hmac(sha1)
      would receive the first 20 bytes while the last 16 would be given to
      cbc(aes).
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      3c09f17c
    • Herbert Xu's avatar
      [CRYPTO] api: Add support for multiple template parameters · 39e1ee01
      Herbert Xu authored
      
      This patch adds support for having multiple parameters to
      a template, separated by a comma.  It also adds support
      for integer parameters in addition to the current algorithm
      parameter type.
      
      This will be used by the authenc template which will have
      four parameters: the authentication algorithm, the encryption
      algorithm, the authentication size and the encryption key
      length.
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      39e1ee01
  2. Jul 11, 2007
  3. May 02, 2007
    • Herbert Xu's avatar
      [CRYPTO] api: Do not remove users unless new algorithm matches · a73e6996
      Herbert Xu authored
      
      As it is whenever a new algorithm with the same name is registered
      users of the old algorithm will be removed so that they can take
      advantage of the new algorithm.  This presents a problem when the
      new algorithm is not equivalent to the old algorithm.  In particular,
      the new algorithm might only function on top of the existing one.
      
      Hence we should not remove users unless they can make use of the
      new algorithm.
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      a73e6996
    • Herbert Xu's avatar
      [CRYPTO] api: Add async blkcipher type · b5b7f088
      Herbert Xu authored
      
      This patch adds the mid-level interface for asynchronous block ciphers.
      It also includes a generic queueing mechanism that can be used by other
      asynchronous crypto operations in future.
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      b5b7f088
    • Herbert Xu's avatar
      [CRYPTO] templates: Pass type/mask when creating instances · ebc610e5
      Herbert Xu authored
      
      This patch passes the type/mask along when constructing instances of
      templates.  This is in preparation for templates that may support
      multiple types of instances depending on what is requested.  For example,
      the planned software async crypto driver will use this construct.
      
      For the moment this allows us to check whether the instance constructed
      is of the correct type and avoid returning success if the type does not
      match.
      
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      ebc610e5
  4. Feb 06, 2007
  5. Sep 21, 2006
Loading