Not trying to hijack this thread, but I studied in my security class that SHA1 is being attacked so to speak in terms of crypto analysis and it was suggested in the book that it not be used but something like SHA512 be used instead.
Just to give you all a heads up :)
On Tue, May 14, 2013 at 6:49 PM, Jon Medhurst (Tixy) tixy@linaro.orgwrote:
On Tue, 2013-05-14 at 14:16 +0200, Ard Biesheuvel wrote:
These assembler implementations of SHA1 and AES have been in the upstream source tree since September 2012 but need to be selected explicitly in order to be enabled.
Signed-off-by: Ard Biesheuvel ard.biesheuvel@linaro.org
linaro/configs/linaro-base.conf | 2 ++ 1 file changed, 2 insertions(+)
diff --git a/linaro/configs/linaro-base.conf
b/linaro/configs/linaro-base.conf
index 5c748a7..ba7b97b 100644 --- a/linaro/configs/linaro-base.conf +++ b/linaro/configs/linaro-base.conf @@ -86,3 +86,5 @@ CONFIG_HW_PERF_EVENTS=y CONFIG_FUNCTION_TRACER=y CONFIG_ENABLE_DEFAULT_TRACERS=y CONFIG_PROC_DEVICETREE=y +CONFIG_CRYPTO_AES_ARM=y +CONFIG_CRYPTO_SHA1_ARM=y
This also enables CONFIG_CRYPTO_SHA1 which we didn't already have enabled in our builds, so I assume nothing actually needs this option. If that's true, then it doesn't seem worth enabling an optimised version of code which isn't going to be used. ;-)
-- Tixy
linaro-dev mailing list linaro-dev@lists.linaro.org http://lists.linaro.org/mailman/listinfo/linaro-dev