On Thu, Mar 29, 2012 at 07:53:30AM +0200, Steffen Klassert wrote:
>
> Ok, so I'll respin this one to the mainline and resend.
I'll resend the whole patchset, please ignore this one.
Thanks!
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to maj
On Thu, Mar 29, 2012 at 01:46:26PM +0800, Herbert Xu wrote:
> On Thu, Mar 29, 2012 at 07:45:04AM +0200, Steffen Klassert wrote:
> > On Mon, Mar 26, 2012 at 09:28:27AM +0200, Steffen Klassert wrote:
> > > +
> > > return netlink_dump_start(crypto_nlsk, skb, nlh,
> > > -
On Thu, Mar 29, 2012 at 07:45:04AM +0200, Steffen Klassert wrote:
> On Mon, Mar 26, 2012 at 09:28:27AM +0200, Steffen Klassert wrote:
> > +
> > return netlink_dump_start(crypto_nlsk, skb, nlh,
> > - link->dump, link->done, 0);
> > +
On Mon, Mar 26, 2012 at 09:28:27AM +0200, Steffen Klassert wrote:
> +
> return netlink_dump_start(crypto_nlsk, skb, nlh,
> - link->dump, link->done, 0);
> + link->dump, link->done, dump_alloc);
I've just noti
On Wed, Mar 28, 2012 at 11:14:41PM +0200, Milan Broz wrote:
> If you want something simple, use LUKS. cryptsetup
> and dmcrypt is in all distributions by default.
> Truecrypt uses dmcrypt by default as backend as well.
Looking around a bit, it appears that cryptsetup is in
the ubuntu server set up
On 03/28/2012 10:42 PM, Dale Amon wrote:
So does anyone have a suggestion as to where I have
gone wrong? It's been over half a decade since I've
gone through this and even longer since I was doing
the magic dance with patching and building my own
losetup, mount, etc...
If you want something sim
On Wed, Mar 28, 2012 at 12:03:22PM -0700, Ryan Corder wrote:
> Full disk encryption with LUKS is actually pretty easy, and I do have the full
> process written down. I've been looking for a reason to actually type it out
> for later use...I'll do that later today and then send it on for reference.
On Wed, Mar 28, 2012 at 09:37:16AM -0700, C.J. Adams-Collier KF7BMP wrote:
| card be inserted at boot time. Ryan's history administering the
| intranet for a company in the medical field have set his bar probably
| higher than DISA's in many ways, but may not require that the physical
| token be i
Classification: UNCLASSIFIED
I've used AES before. Came on a disk, popped it in, self started and asked me
to supply a password (initial setup stuff), about 3 hours later I had an
encryped hard disk. This was for my corp laptop though, I don't use it on my
home Debian laptop. My current work
Hey there Dale & List,
I believe Ryan and Bill (CC'd) are using AES full disk crypto on their
systems. It seems complicated to me, but they can probably give you
tips. I think Bill is using Debian and Ryan is using Arch. Bill's
(DISA's) policies are pretty strict and probably require that his s
Been away from the list for awhile and you went
and moved the list on me!
Yesterday I pulled out my notes from the last time
I set up a crypto disk and found that basically,
nothing worked.
The losetup lists all the appropriate crypto types
in its Man page but when I try to actually use AES256,
i
Hey,
How activate the IPsec parallelization ?
I compiled the crypto-2.6 kernel with this param :
CONFIG_CRYPTO_... = y
CONFIG_PADATA = y
CONFIG_SMP=y
After installation on 2 servers (IPSEC tunnel), i don't detect the IPsec
parallelization.
The algorithm is loaded (present in /proc/crypto), but onl
12 matches
Mail list logo