lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 22 Jan 2013 13:43:54 -0600 From: Matt Sealey <matt@...esi-usa.com> To: Jussi Kivilinna <jussi.kivilinna@...et.fi> Cc: Nicolas Pitre <nico@...xnic.net>, LKML <linux-kernel@...r.kernel.org>, linux-crypto <linux-crypto@...r.kernel.org>, "David S. Miller" <davem@...emloft.net>, Herbert Xu <herbert@...dor.apana.org.au>, Russell King <linux@....linux.org.uk>, Linux ARM Kernel ML <linux-arm-kernel@...ts.infradead.org>, Dave Martin <dave.martin@...aro.org>, David McCullough <david_mccullough@...fee.com> Subject: Re: [PATCH] crypto: fix FTBFS with ARM SHA1-asm and THUMB2_KERNEL On Tue, Jan 22, 2013 at 1:50 AM, Jussi Kivilinna <jussi.kivilinna@...et.fi> wrote: > >> There is 'tcrypt' module in crypto/ for quick benchmarking. 'modprobe >> tcrypt mode=500 sec=1' tests AES in various cipher-modes, using different >> buffer sizes and outputs results to kernel log. >> > > Actually mode=200 might be better, as mode=500 is for asynchronous > implementations and might use hardware crypto if such device/module is > available. Okeydokey I'll start running some tests.. -- Matt Sealey <matt@...esi-usa.com> Product Development Analyst, Genesi USA, Inc. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists