linux_dsm_epyc7002/include/crypto/internal
Herbert Xu 7cecadb7cc crypto: rng - Do not free default RNG when it becomes unused
Currently we free the default RNG when its use count hits zero.
This was OK when the IV generators would latch onto the RNG at
instance creation time and keep it until the instance is torn
down.

Now that IV generators only keep the RNG reference during init
time this scheme causes the default RNG to come and go at a high
frequencey.  This is highly undesirable as we want to keep a single
RNG in use unless the admin wants it to be removed.

This patch changes the scheme so that the system RNG once allocated
is never removed unless a specifically requested.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2015-06-22 15:49:18 +08:00
..
aead.h crypto: aead - Fix aead_instance struct size 2015-06-19 14:16:30 +08:00
akcipher.h crypto: akcipher - add PKE API 2015-06-17 17:03:14 +08:00
compress.h crypto: compress - Add pcomp interface 2009-03-04 15:05:33 +08:00
geniv.h crypto: aead - Add common IV generation code 2015-05-28 11:23:17 +08:00
hash.h crypto: sha-mb - multibuffer crypto infrastructure 2014-08-25 20:32:25 +08:00
rng.h crypto: rng - Do not free default RNG when it becomes unused 2015-06-22 15:49:18 +08:00
rsa.h crypto: rsa - add a new rsa generic implementation 2015-06-17 17:03:53 +08:00
skcipher.h crypto: skcipher - Don't use __crypto_dequeue_request() 2014-06-20 21:26:05 +08:00