Skip to content


Subversion checkout URL

You can clone with
Download ZIP
Commits on Aug 1, 2012
  1. @jkivilin @herbertx

    crypto: crypto_null - use crypto_[un]register_algs

    jkivilin authored herbertx committed
    Combine all crypto_alg to be registered and use new crypto_[un]register_algs
    functions. This simplifies init/exit code.
    Signed-off-by: Jussi Kivilinna <>
    Signed-off-by: Herbert Xu <>
Commits on Feb 16, 2010
  1. @RichiH @herbertx

    crypto: crypto_null - Fix checkpatch errors

    RichiH authored herbertx committed
    Signed-off-by: Richard Hartmann <>
    Signed-off-by: Herbert Xu <>
Commits on Dec 25, 2008
  1. @herbertx

    crypto: null - Switch to shash

    herbertx authored
    This patch changes digest_null to the new shash interface.
    Signed-off-by: Herbert Xu <>
Commits on Apr 21, 2008
  1. @kamalesh-babulal @herbertx

    [CRYPTO] all: Clean up init()/fini()

    kamalesh-babulal authored herbertx committed
    On Thu, Mar 27, 2008 at 03:40:36PM +0100, Bodo Eggert wrote:
    > Kamalesh Babulal <> wrote:
    > > This patch cleanups the crypto code, replaces the init() and fini()
    > > with the <algorithm name>_init/_fini
    > This part ist OK.
    > > or init/fini_<algorithm name> (if the 
    > > <algorithm name>_init/_fini exist)
    > Having init_foo and foo_init won't be a good thing, will it? I'd start
    > confusing them.
    > What about foo_modinit instead?
    Thanks for the suggestion, the init() is replaced with
    	<algorithm name>_mod_init ()
    and fini () is replaced with <algorithm name>_mod_fini.
    Signed-off-by: Kamalesh Babulal <>
    Signed-off-by: Herbert Xu <>
Commits on Jan 10, 2008
  1. @herbertx

    [CRYPTO] null: Allow setkey on digest_null

    herbertx authored
    We need to allow setkey on digest_null if it is to be used directly by
    authenc instead of through hmac.
    Signed-off-by: Herbert Xu <>
  2. @herbertx

    [CRYPTO] null: Add null blkcipher algorithm

    herbertx authored
    This patch adds a null blkcipher algorithm called ecb(cipher_null) for
    backwards compatibility.  Previously the null algorithm when used by
    IPsec copied the data byte by byte.  This new algorithm optimises that
    to a straight memcpy which lets us better measure inherent overheads in
    our IPsec code.
    Signed-off-by: Herbert Xu <>
Commits on Nov 2, 2007
  1. cleanup asm/scatterlist.h includes

    Adrian Bunk authored Jens Axboe committed
    Not architecture specific code should not #include <asm/scatterlist.h>.
    This patch therefore either replaces them with
    #include <linux/scatterlist.h> or simply removes them if they were
    Signed-off-by: Adrian Bunk <>
    Signed-off-by: Jens Axboe <>
Commits on Sep 21, 2006
  1. @herbertx

    [CRYPTO] api: Get rid of flags argument to setkey

    herbertx authored
    Now that the tfm is passed directly to setkey instead of the ctx, we no
    longer need to pass the &tfm->crt_flags pointer.
    This patch also gets rid of a few unnecessary checks on the key length
    for ciphers as the cipher layer guarantees that the key length is within
    the bounds specified by the algorithm.
    Rather than testing dia_setkey every time, this patch does it only once
    during crypto_alloc_tfm.  The redundant check from crypto_digest_setkey
    is also removed.
    Signed-off-by: Herbert Xu <>
Commits on Jun 26, 2006
  1. @herbertx

    [CRYPTO] all: Pass tfm instead of ctx to algorithms

    herbertx authored
    Up until now algorithms have been happy to get a context pointer since
    they know everything that's in the tfm already (e.g., alignment, block
    However, once we have parameterised algorithms, such information will
    be specific to each tfm.  So the algorithm API needs to be changed to
    pass the tfm structure instead of the context pointer.
    This patch is basically a text substitution.  The only tricky bit is
    the assembly routines that need to get the context pointer offset
    through asm-offsets.h.
    Signed-off-by: Herbert Xu <>
Commits on May 17, 2005
  1. @kaber

    [PATCH] crypto: fix null encryption/compression

    kaber authored Linus Torvalds committed
    null_encrypt() needs to copy the data in case src and dst are disjunct,
    null_compress() needs to copy the data in any case as far as I can tell.  I
    joined compress/decompress and encrypt/decrypt to avoid duplicating code.
    Without this patch ESP null_enc packets look like this:
    IP (tos 0x0, ttl  64, id 23130, offset 0, flags [DF], length: 128) > ESP(spi=0x0f9ca149,seq=0x4)
    	0x0000:  4500 0080 5a5a 4000 4032 cbef 0a00 0001  E...ZZ@.@2......
    	0x0010:  0a00 0002 0f9c a149 0000 0004 0000 0000  .......I........
    	0x0020:  0000 0000 0000 0000 0000 0000 0000 0000  ................
    	0x0030:  0000 0000 0000 0000 0000 0000 0000 0000  ................
    	0x0040:  0000 0000 0000 0000 0000 0000 0000 0000  ................
    	0x0050:  0000                                     ..
    IP (tos 0x0, ttl  64, id 256, offset 0, flags [DF], length: 128) > ESP(spi=0x0e4f7b51,seq=0x2)
    	0x0000:  4500 0080 0100 4000 4032 254a 0a00 0002  E.....@.@2%J....
    	0x0010:  0a00 0001 0e4f 7b51 0000 0002 a8a8 a8a8  .....O{Q........
    	0x0020:  a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8  ................
    	0x0030:  a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8  ................
    	0x0040:  a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8 a8a8  ................
    	0x0050:  a8a8                                     ..
    Signed-off-by: Patrick McHardy <>
    Signed-off-by: Herbert Xu <>
    Signed-off-by: Andrew Morton <>
    Signed-off-by: Linus Torvalds <>
Commits on Apr 16, 2005
  1. Linux-2.6.12-rc2

    Linus Torvalds authored
    Initial git repository build. I'm not bothering with the full history,
    even though we have it. We can create a separate "historical" git
    archive of that later if we want to, and in the meantime it's about
    3.2GB when imported into git - space that would just make the early
    git days unnecessarily complicated, when we don't have a lot of good
    infrastructure for it.
    Let it rip!
Something went wrong with that request. Please try again.