summaryrefslogtreecommitdiff
path: root/crypto/shash.c
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2010-10-19 21:31:55 +0800
committerHerbert Xu <herbert@gondor.apana.org.au>2010-11-26 20:53:59 +0800
commitfcbb8a3beda31c7b3bc4db59314a4efb147ee969 (patch)
tree05ee3ee43e525ef9aade50341c21de99af5a7e70 /crypto/shash.c
parente07b05ce919815a756f5f571619aacd9dfd10194 (diff)
downloadlinux-crypto-fcbb8a3beda31c7b3bc4db59314a4efb147ee969.tar.gz
linux-crypto-fcbb8a3beda31c7b3bc4db59314a4efb147ee969.zip
crypto: algif_skcipher - User-space interface for skcipher operations
This patch adds the af_alg plugin for symmetric key ciphers, corresponding to the ablkcipher kernel operation type. Keys can optionally be set through the setsockopt interface. Once a sendmsg call occurs without MSG_MORE no further writes may be made to the socket until all previous data has been read. IVs and and whether encryption/decryption is performed can be set through the setsockopt interface or as a control message to sendmsg. The interface is completely synchronous, all operations are carried out in recvmsg(2) and will complete prior to the system call returning. The splice(2) interface support reading the user-space data directly without copying (except that the Crypto API itself may copy the data if alignment is off). The recvmsg(2) interface supports directly writing to user-space without additional copying, i.e., the kernel crypto interface will receive the user-space address as its output SG list. Thakns to Miloslav Trmac for reviewing this and contributing fixes and improvements. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'crypto/shash.c')
0 files changed, 0 insertions, 0 deletions