[PATCH] crypto: tcrypt - removed unused variable.

2013-01-15 Thread Vakul Garg
Removed unused variable for storing output string from: (a) test_ahash_jiffies_digest() (b) test_ahash_jiffies() (c) test_ahash_cycles_digest() (d) test_ahash_cycles() This variable is not needed in above functions since the caller function test_ahash_speed() alrea

Re: [dm-devel] [PATCH v2.1 0/1] dm-integrity: integrity protection device-mapper target

2013-01-15 Thread Alasdair G Kergon
On Tue, Jan 15, 2013 at 10:35:56PM +0200, Dmitry Kasatkin wrote: > I addressed all comments I got so far. Can it be now added to the DM tree? Mikulas will review the latest version with this in mind. Alasdair -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body

Re: [PATCH] crypto: omap-sham - Fix compile errors when CONFIG_OF not defined

2013-01-15 Thread Mark A. Greer
On Tue, Jan 15, 2013 at 01:53:02PM -0700, Mark A. Greer wrote: > From: "Mark A. Greer" > > Fix the compile errors created by commit 2545e8d > (crypto: omap-sham - Add Device Tree Support) > when CONFIG_OF is not defined. This includes > changing omap_sham_get_res_dev() to omap_sham_get_res_of()

[PATCH] crypto: omap-sham - Fix compile errors when CONFIG_OF not defined

2013-01-15 Thread Mark A. Greer
From: "Mark A. Greer" Fix the compile errors created by commit 2545e8d (crypto: omap-sham - Add Device Tree Support) when CONFIG_OF is not defined. This includes changing omap_sham_get_res_dev() to omap_sham_get_res_of() and creating an empty version of omap_sham_of_match[]. Signed-off-by: Mark

[PATCH v2.1 1/1] dm-integrity: integrity protection device-mapper target

2013-01-15 Thread Dmitry Kasatkin
Device-mapper "integrity" target provides transparent cryptographic integrity protection of the underlying read-write block device using hash-based message authentication codes (HMACs). HMACs can be stored on the same or different block device. dm-integrity uses an encrypted key type, stored on th

[PATCH v2.1 0/1] dm-integrity: integrity protection device-mapper target

2013-01-15 Thread Dmitry Kasatkin
Device-mapper "integrity" target provides transparent cryptographic integrity protection of underlying read-write block device using hash-based message authentication codes (HMACs), which can be stored on the same or different block device. Target uses kernel keyring to obtain a secret key for usi

[RFC 0/1] ima/evm: signature verification support using asymmetric keys

2013-01-15 Thread Dmitry Kasatkin
Asymmetric keys were introduced in linux-3.7 to verify the signature on signed kernel modules. The asymmetric keys infrastructure abstracts the signature verification from the crypto details. This patch adds IMA/EVM signature verification using asymmetric keys. Support for additional signature v