1. 25 12月, 2008 2 次提交
  2. 10 12月, 2008 1 次提交
  3. 29 8月, 2008 6 次提交
  4. 15 7月, 2008 1 次提交
  5. 10 7月, 2008 5 次提交
  6. 21 4月, 2008 3 次提交
  7. 23 2月, 2008 1 次提交
  8. 18 2月, 2008 1 次提交
    • A
      [CRYPTO] null: Add missing Kconfig dependency on BLKCIPHER · c8620c25
      Adrian Bunk 提交于
      This patch fixes the following build error caused by commit 
      3631c650:
      
      <--  snip  -->
      
      ...
        LD      .tmp_vmlinux1
      crypto/built-in.o: In function `skcipher_null_crypt':
      crypto_null.c:(.text+0x3d14): undefined reference to `blkcipher_walk_virt'
      crypto_null.c:(.text+0x3d14): relocation truncated to fit: R_MIPS_26 against `blkcipher_walk_virt'
      crypto/built-in.o: In function `$L32':
      crypto_null.c:(.text+0x3d54): undefined reference to `blkcipher_walk_done'
      crypto_null.c:(.text+0x3d54): relocation truncated to fit: R_MIPS_26 against `blkcipher_walk_done'
      crypto/built-in.o:(.data+0x2e8): undefined reference to `crypto_blkcipher_type'
      make[1]: *** [.tmp_vmlinux1] Error 1
      
      <--  snip  -->
      Signed-off-by: NAdrian Bunk <bunk@kernel.org>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      c8620c25
  9. 15 2月, 2008 1 次提交
  10. 11 1月, 2008 17 次提交
  11. 11 10月, 2007 2 次提交
    • R
      [CRYPTO] xts: XTS blockcipher mode implementation without partial blocks · f19f5111
      Rik Snel 提交于
      XTS currently considered to be the successor of the LRW mode by the IEEE1619
      workgroup. LRW was discarded, because it was not secure if the encyption key
      itself is encrypted with LRW.
      
      XTS does not have this problem. The implementation is pretty straightforward,
      a new function was added to gf128mul to handle GF(128) elements in ble format.
      Four testvectors from the specification
      	http://grouper.ieee.org/groups/1619/email/pdf00086.pdf
      were added, and they verify on my system.
      Signed-off-by: NRik Snel <rsnel@cube.dyndns.org>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      f19f5111
    • H
      [CRYPTO] aead: Add authenc · 3c09f17c
      Herbert Xu 提交于
      This patch adds the authenc algorithm which constructs an AEAD algorithm
      from an asynchronous block cipher and a hash.  The construction is done
      by concatenating the encrypted result from the cipher with the output
      from the hash, as is used by the IPsec ESP protocol.
      
      The authenc algorithm exists as a template with four parameters:
      
      	authenc(auth, authsize, enc, enckeylen).
      
      The authentication algorithm, the authentication size (i.e., truncating
      the output of the authentication algorithm), the encryption algorithm,
      and the encryption key length.  Both the size field and the key length
      field are in bytes.  For example, AES-128 with SHA1-HMAC would be
      represented by
      
      	authenc(hmac(sha1), 12, cbc(aes), 16)
      
      The key for the authenc algorithm is the concatenation of the keys for
      the authentication algorithm with the encryption algorithm.  For the
      above example, if a key of length 36 bytes is given, then hmac(sha1)
      would receive the first 20 bytes while the last 16 would be given to
      cbc(aes).
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      3c09f17c