Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface

2010-08-24 Thread Tomas Mraz
On Wed, 2010-08-25 at 08:20 +0200, Pavel Machek wrote: > Hi! > > > Motivations for the extensions: governments are asking for more security > > features in the operating systems they procure, which make user-space > > implementations impractical. A few examples: > > > > * Advanced crypto module

Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface

2010-08-24 Thread Pavel Machek
Hi! > Motivations for the extensions: governments are asking for more security > features in the operating systems they procure, which make user-space > implementations impractical. A few examples: > > * Advanced crypto module for OSPP for Common Criteria requires OS services > implementing se

[linux-cifs-client][PATCH][Try 2] Eliminate sparse warning - bad constant expression

2010-08-24 Thread shirishpargaonkar
Eliminiate sparse warning during usage of crypto_shash_* APIs error: bad constant expression Allocate memory for shash descriptors once, so that we do not kmalloc/kfree it for every signature generation (shash descriptor for md5 hash). >From ed753861981decc44b5660b52268077b74f3 Mon Se

[linux-cifs-client][PATCH] Eliminate sparse warning - bad constant expression

2010-08-24 Thread shirishpargaonkar
Eliminiate sparse warning during usage of crypto_shash_* APIs error: bad constant expression >From 952f73a6813c119f78c657bdb40d1ee741efb3c2 Mon Sep 17 00:00:00 2001 From: Shirish Pargaonkar Date: Tue, 24 Aug 2010 09:49:57 -0500 Subject: [PATCH] eliminate sparse warnings during crypto_sha

Re: crypto apis in cifs module allocating storage for character array during run-time vs. dynamic allocation

2010-08-24 Thread Shirish Pargaonkar
On Mon, Aug 23, 2010 at 5:39 PM, Miloslav Trmac wrote: > - "Shirish Pargaonkar" wrote: >> Instead of determining and allocating a char array for use during usage of >> crypto_shash_* calls, would like to instead dynamically >> allocate (and free) storage for the duration of crypto calculation