On Wed, 28 Apr 2010 05:33:57 -0700 <lee.nipper@xxxxxxxxx> wrote: > Add the these hmac algorithms to talitos: > hmac(md5), > hmac(sha1), > hmac(sha256), > hmac(sha384), > hmac(sha512). > These are all type ahash. > > Signed-off-by: Lee Nipper <lee.nipper@xxxxxxxxx> > --- > Currently on an 8349E, there's a problem with hmac for > any talitos hmac sequence requiring an > intermediate hash context (Pointer DWORD 1); > the result is an incorrect hmac. > An intermediate hash context is required for > something longer than (65536-blocksize), and for other > cases when update/finup/final are used inefficiently. > Interestingly, a normal hash (without hmac) works perfectly > when using an intermediate context. > So, I solicit any hints/help for figuring this out, > since this hmac patch is a bust without this being corrected. I set up an IPsec AH transport mode tunnel between a sec3.0 (8572) doing crypto in h/w and another in s/w. When trying to tx a single 64 byte ICMP packet from s/w crypto host to h/w crypto host, I get 2728 (!) talitos IRQs all at once: [root@hagrid ~]# grep tali /proc/interrupts 45: 161575 0 OpenPIC Level talitos [root@hagrid ~]# grep tali /proc/interrupts 45: 164303 0 OpenPIC Level talitos and no ICMP reply...will have to investigate this further. Kim -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html