Searched hist:ba7db6e014eceb116bf6f8cebc7d3d2eb149c7d6 (Results 1 – 2 of 2) sorted by relevance
| /optee_os/core/drivers/crypto/caam/ |
| H A D | caam_rng.c | ba7db6e014eceb116bf6f8cebc7d3d2eb149c7d6 Thu Nov 14 06:37:14 UTC 2024 Sahil Malhotra <sahil.malhotra@nxp.com> drivers: caam: enable/disable prediction resistance based on CONFIG flag
With prediction resistance enabled, on every random number request CAAM is forced to do reseeding of DRBG, which is time taking process which leads to lower Random number generation performance. So to give user the flexibility to enable/disable this feature a flag CFG_CAAM_RNG_RUNTIME_PR is introduced. By default it will be disabled and user can enable it as per its requirement.
Signed-off-by: Sahil Malhotra <sahil.malhotra@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
|
| H A D | crypto.mk | ba7db6e014eceb116bf6f8cebc7d3d2eb149c7d6 Thu Nov 14 06:37:14 UTC 2024 Sahil Malhotra <sahil.malhotra@nxp.com> drivers: caam: enable/disable prediction resistance based on CONFIG flag
With prediction resistance enabled, on every random number request CAAM is forced to do reseeding of DRBG, which is time taking process which leads to lower Random number generation performance. So to give user the flexibility to enable/disable this feature a flag CFG_CAAM_RNG_RUNTIME_PR is introduced. By default it will be disabled and user can enable it as per its requirement.
Signed-off-by: Sahil Malhotra <sahil.malhotra@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
|