Removed unused variable for storing output string from:
(a) test_ahash_jiffies_digest()
(b) test_ahash_jiffies()
(c) test_ahash_cycles_digest()
(d) test_ahash_cycles()
This variable is not needed in above functions since the caller function
test_ahash_speed() alrea
On Tue, Jan 15, 2013 at 10:35:56PM +0200, Dmitry Kasatkin wrote:
> I addressed all comments I got so far. Can it be now added to the DM tree?
Mikulas will review the latest version with this in mind.
Alasdair
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body
On Tue, Jan 15, 2013 at 01:53:02PM -0700, Mark A. Greer wrote:
> From: "Mark A. Greer"
>
> Fix the compile errors created by commit 2545e8d
> (crypto: omap-sham - Add Device Tree Support)
> when CONFIG_OF is not defined. This includes
> changing omap_sham_get_res_dev() to omap_sham_get_res_of()
From: "Mark A. Greer"
Fix the compile errors created by commit 2545e8d
(crypto: omap-sham - Add Device Tree Support)
when CONFIG_OF is not defined. This includes
changing omap_sham_get_res_dev() to omap_sham_get_res_of()
and creating an empty version of omap_sham_of_match[].
Signed-off-by: Mark
Device-mapper "integrity" target provides transparent cryptographic integrity
protection of the underlying read-write block device using hash-based message
authentication codes (HMACs). HMACs can be stored on the same or different
block device.
dm-integrity uses an encrypted key type, stored on th
Device-mapper "integrity" target provides transparent cryptographic integrity
protection of underlying read-write block device using hash-based message
authentication codes (HMACs), which can be stored on the same or different
block device.
Target uses kernel keyring to obtain a secret key for usi
Asymmetric keys were introduced in linux-3.7 to verify the signature on signed
kernel modules. The asymmetric keys infrastructure abstracts the signature
verification from the crypto details. This patch adds IMA/EVM signature
verification using asymmetric keys. Support for additional signature
v