[PATCH] use ERR_CAST

2013-01-22 Thread Julia Lawall
ERR_CAST is more concise than PTR_ERR followed by ERR_PTR. Using it also occasionally removes the need for an err variable. -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.o

[PATCH] crypto: use ERR_CAST

2013-01-22 Thread Julia Lawall
From: Julia Lawall Replace PTR_ERR followed by ERR_PTR by ERR_CAST, to be more concise. The semantic patch that makes this change is as follows: (http://coccinelle.lip6.fr/) // @@ expression err,x; @@ - err = PTR_ERR(x); if (IS_ERR(x)) -return ERR_PTR(err); +

Query about ahash support

2013-01-22 Thread Garg Vakul-B16394
Hi Currently, tcrypt ahash speed test code waits for previous request to complete before sending next crypto_ahash_update() request. The cryptographic offload hard accelerators (e.g. CAAM) supports multiple outstanding crypto requests for the same transform. Does the asynchronous hash support in

[PATCH v3 1/1] dm-integrity: integrity protection device-mapper target

2013-01-22 Thread Dmitry Kasatkin
Device-mapper "integrity" target provides transparent cryptographic integrity protection of the underlying read-write block device using hash-based message authentication codes (HMACs). HMACs can be stored on the same or different block device. dm-integrity uses an encrypted key type, stored on th

[PATCH v3 0/1] dm-integrity: integrity protection device-mapper target

2013-01-22 Thread Dmitry Kasatkin
Device-mapper "integrity" target provides transparent cryptographic integrity protection of underlying read-write block device using hash-based message authentication codes (HMACs), which can be stored on the same or different block device. Target uses kernel keyring to obtain a secret key for usi

Re: [PATCH] crypto: fix FTBFS with ARM SHA1-asm and THUMB2_KERNEL

2013-01-22 Thread Matt Sealey
On Tue, Jan 22, 2013 at 1:50 AM, Jussi Kivilinna wrote: > >> There is 'tcrypt' module in crypto/ for quick benchmarking. 'modprobe >> tcrypt mode=500 sec=1' tests AES in various cipher-modes, using different >> buffer sizes and outputs results to kernel log. >> > > Actually mode=200 might be bette

Re: [RFC 1/1] ima: digital signature verification using asymmetric keys

2013-01-22 Thread Mimi Zohar
On Tue, 2013-01-15 at 12:34 +0200, Dmitry Kasatkin wrote: > Asymmetric keys were introduced in linux-3.7 to verify the signature on > signed kernel modules. The asymmetric keys infrastructure abstracts the > signature verification from the crypto details. This patch adds IMA/EVM > signature verif

[PATCH] crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

2013-01-22 Thread Vakul Garg
This new property defines the era of the particular SEC version. The compatible property in device tree "crypto" node has been updated not to contain SEC era numbers. Signed-off-by: Vakul Garg --- .../devicetree/bindings/crypto/fsl-sec4.txt| 12 +--- 1 files changed, 9 insertio

[PATCHv1] crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

2013-01-22 Thread Vakul Garg
This new property defines the era of the particular SEC version. The compatible property in device tree "crypto" node has been updated not to contain SEC era numbers. Signed-off-by: Vakul Garg --- Changelog: 1. Marked fsl,sec-era as 'optional'. .../devicetree/bindings/crypto/fsl-sec4.tx

Re: [PATCH] CMAC support for CryptoAPI, fixed patch issues, indent, and testmgr build issues

2013-01-22 Thread Steffen Klassert
(Cc net...@vger.kernel.org) On Mon, Jan 21, 2013 at 07:57:28AM -0500, Tom St Denis wrote: > Hey all, > > Here's an updated patch which addresses a couple of build issues and coding > style complaints. > > I still can't get it to run via testmgr I get > > [ 162.407807] alg: No test for cmac