1. 29 8月, 2008 6 次提交
  2. 15 7月, 2008 1 次提交
  3. 10 7月, 2008 5 次提交
  4. 21 4月, 2008 3 次提交
  5. 23 2月, 2008 1 次提交
  6. 18 2月, 2008 1 次提交
    • A
      [CRYPTO] null: Add missing Kconfig dependency on BLKCIPHER · c8620c25
      Adrian Bunk 提交于
      This patch fixes the following build error caused by commit 
      3631c650:
      
      <--  snip  -->
      
      ...
        LD      .tmp_vmlinux1
      crypto/built-in.o: In function `skcipher_null_crypt':
      crypto_null.c:(.text+0x3d14): undefined reference to `blkcipher_walk_virt'
      crypto_null.c:(.text+0x3d14): relocation truncated to fit: R_MIPS_26 against `blkcipher_walk_virt'
      crypto/built-in.o: In function `$L32':
      crypto_null.c:(.text+0x3d54): undefined reference to `blkcipher_walk_done'
      crypto_null.c:(.text+0x3d54): relocation truncated to fit: R_MIPS_26 against `blkcipher_walk_done'
      crypto/built-in.o:(.data+0x2e8): undefined reference to `crypto_blkcipher_type'
      make[1]: *** [.tmp_vmlinux1] Error 1
      
      <--  snip  -->
      Signed-off-by: NAdrian Bunk <bunk@kernel.org>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      c8620c25
  7. 15 2月, 2008 1 次提交
  8. 11 1月, 2008 17 次提交
  9. 11 10月, 2007 5 次提交
    • R
      [CRYPTO] xts: XTS blockcipher mode implementation without partial blocks · f19f5111
      Rik Snel 提交于
      XTS currently considered to be the successor of the LRW mode by the IEEE1619
      workgroup. LRW was discarded, because it was not secure if the encyption key
      itself is encrypted with LRW.
      
      XTS does not have this problem. The implementation is pretty straightforward,
      a new function was added to gf128mul to handle GF(128) elements in ble format.
      Four testvectors from the specification
      	http://grouper.ieee.org/groups/1619/email/pdf00086.pdf
      were added, and they verify on my system.
      Signed-off-by: NRik Snel <rsnel@cube.dyndns.org>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      f19f5111
    • H
      [CRYPTO] aead: Add authenc · 3c09f17c
      Herbert Xu 提交于
      This patch adds the authenc algorithm which constructs an AEAD algorithm
      from an asynchronous block cipher and a hash.  The construction is done
      by concatenating the encrypted result from the cipher with the output
      from the hash, as is used by the IPsec ESP protocol.
      
      The authenc algorithm exists as a template with four parameters:
      
      	authenc(auth, authsize, enc, enckeylen).
      
      The authentication algorithm, the authentication size (i.e., truncating
      the output of the authentication algorithm), the encryption algorithm,
      and the encryption key length.  Both the size field and the key length
      field are in bytes.  For example, AES-128 with SHA1-HMAC would be
      represented by
      
      	authenc(hmac(sha1), 12, cbc(aes), 16)
      
      The key for the authenc algorithm is the concatenation of the keys for
      the authentication algorithm with the encryption algorithm.  For the
      above example, if a key of length 36 bytes is given, then hmac(sha1)
      would receive the first 20 bytes while the last 16 would be given to
      cbc(aes).
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      3c09f17c
    • H
      [CRYPTO] api: Add aead crypto type · 1ae97820
      Herbert Xu 提交于
      This patch adds crypto_aead which is the interface for AEAD
      (Authenticated Encryption with Associated Data) algorithms.
      
      AEAD algorithms perform authentication and encryption in one
      step.  Traditionally users (such as IPsec) would use two
      different crypto algorithms to perform these.  With AEAD
      this comes down to one algorithm and one operation.
      
      Of course if traditional algorithms were used we'd still
      be doing two operations underneath.  However, real AEAD
      algorithms may allow the underlying operations to be
      optimised as well.
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      1ae97820
    • H
      [CRYPTO] seed: New cipher algorithm · e2ee95b8
      Hye-Shik Chang 提交于
      This patch adds support for the SEED cipher (RFC4269).
      
      This patch have been used in few VPN appliance vendors in Korea for
      several years.  And it was verified by KISA, who developed the
      algorithm itself.
      
      As its importance in Korean banking industry, it would be great
      if linux incorporates the support.
      Signed-off-by: NHye-Shik Chang <perky@FreeBSD.org>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      e2ee95b8
    • A
      [CRYPTO] Kconfig: Remove "default m"s · a349365e
      Adrian Bunk 提交于
      Other options requiring specific block cipher algorithms already have
      the appropriate select's.
      Signed-off-by: NAdrian Bunk <bunk@stusta.de>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      a349365e