1. 21 Mar, 2006 2 commits
    • Eric Sesterhenn's avatar
      [CRYPTO] all: Use kzalloc where possible · bbeb563f
      Eric Sesterhenn authored
      
      this patch converts crypto/ to kzalloc usage.
      Compile tested with allyesconfig.
      Signed-off-by: default avatarEric Sesterhenn <snakebyte@gmx.de>
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      bbeb563f
    • Herbert Xu's avatar
      [CRYPTO] api: Align tfm context as wide as possible · f10b7897
      Herbert Xu authored
      
      Since tfm contexts can contain arbitrary types we should provide at least
      natural alignment (__attribute__ ((__aligned__))) for them.  In particular,
      this is needed on the Xscale which is a 32-bit architecture with a u64 type
      that requires 64-bit alignment.  This problem was reported by Ronen Shitrit.
      
      The crypto_tfm structure's size was 44 bytes on 32-bit architectures and
      80 bytes on 64-bit architectures.  So adding this requirement only means
      that we have to add an extra 4 bytes on 32-bit architectures.
      
      On i386 the natural alignment is 16 bytes which also benefits the VIA
      Padlock as it no longer has to manually align its context structure to
      128 bits.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      f10b7897
  2. 09 Jan, 2006 2 commits
    • Herbert Xu's avatar
      [CRYPTO] api: Require block size to be less than PAGE_SIZE/8 · 7302533a
      Herbert Xu authored
      
      The cipher code path may allocate up to two blocks of data on the stack.
      Therefore we need to place limits on the maximum block size.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      7302533a
    • Herbert Xu's avatar
      [CRYPTO] Allow multiple implementations of the same algorithm · 5cb1454b
      Herbert Xu authored
      
      This is the first step on the road towards asynchronous support in
      the Crypto API.  It adds support for having multiple crypto_alg objects
      for the same algorithm registered in the system.
      
      For example, each device driver would register a crypto_alg object
      for each algorithm that it supports.  While at the same time the
      user may load software implementations of those same algorithms.
      
      Users of the Crypto API may then select a specific implementation
      by name, or choose any implementation for a given algorithm with
      the highest priority.
      
      The priority field is a 32-bit signed integer.  In future it will be
      possible to modify it from user-space.
      
      This also provides a solution to the problem of selecting amongst
      various AES implementations, that is, aes vs. aes-i586 vs. aes-padlock.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      5cb1454b
  3. 30 Oct, 2005 1 commit
  4. 02 Sep, 2005 1 commit
    • Herbert Xu's avatar
      [CRYPTO]: Added CRYPTO_TFM_REQ_MAY_SLEEP flag · 64baf3cf
      Herbert Xu authored
      
      The crypto layer currently uses in_atomic() to determine whether it is
      allowed to sleep.  This is incorrect since spin locks don't always cause
      in_atomic() to return true.
      
      Instead of that, this patch returns to an earlier idea of a per-tfm flag
      which determines whether sleeping is allowed.  Unlike the earlier version,
      the default is to not allow sleeping.  This ensures that no existing code
      can break.
      
      As usual, this flag may either be set through crypto_alloc_tfm(), or
      just before a specific crypto operation.
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      64baf3cf
  5. 06 Jul, 2005 4 commits
  6. 16 Apr, 2005 1 commit
    • Linus Torvalds's avatar
      Linux-2.6.12-rc2 · 1da177e4
      Linus Torvalds authored
      Initial git repository build. I'm not bothering with the full history,
      even though we have it. We can create a separate "historical" git
      archive of that later if we want to, and in the meantime it's about
      3.2GB when imported into git - space that would just make the early
      git days unnecessarily complicated, when we don't have a lot of good
      infrastructure for it.
      
      Let it rip!
      1da177e4