Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2 8/8] zram: use decompress_noctx
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v2 7/8] zram: use crypto API for compression
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v2 6/8] zram: change zcomp_compress interface
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v2 4/8] crypto/lz4hc: support decompress_noctx
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v2 3/8] crypyo/lz4: support decompress_noctx
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v2 2/8] crypto/lzo: support decompress_noctx
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: akcipher API: plans
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: akcipher API: plans
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- akcipher API: plans
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [GIT PULL] Move cert handling to certs/ directory
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] MPI: Fix mpi_read_buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - enable legacy VFs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - fix for multiple operations on AF_ALG sockets
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aead - fix for multiple operations on AF_ALG sockets
- From: Lars Persson <lars.persson@xxxxxxxx>
- [PATCH] crypto: qat - enable legacy VFs
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] MPI: Fix mpi_read_buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [patch] crypto: qat - silence a static checker warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix writing to JQCR_MS when using service interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: caam: ctrl: Fix the error handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fixing opcode issue on vmx-crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] doc: crypto: warning cleanup
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: aead_alg request size (request context size)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- aead_alg request size (request context size)
- From: Vasile Catalin-B50542 <catalin.vasile@xxxxxxxxxxxxx>
- [GIT PULL] Move cert handling to certs/ directory
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] doc: crypto: warning cleanup
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] doc: crypto: warning cleanup
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH] doc: crypto: warning cleanup
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - Add top-level skcipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: caam: ctrl: Fix the error handling
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [patch] crypto: qat - silence a static checker warning
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] Fixing opcode issue on vmx-crypto
- From: Leonidas S Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fixing vmx-crypto AES-CTR counter bug
- From: Leonidas S Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fixing vmx-crypto AES-CTR counter bug
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: caam: Use the preferred style for memory allocations
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v3 2/3] crypto: caam: ctrl: Propagate the real error code
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v3 1/3] crypto: caam: ctrl: Fix the error handling
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: caam: ctrl: Fix the error handling
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: caam: ctrl: Fix the error handling
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: caam: Use the preferred style for memory allocations
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 2/3] crypto: caam: ctrl: Propagate the real error code
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/3] crypto: caam: ctrl: Fix the error handling
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: caam - fix writing to JQCR_MS when using service interface
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: caam: ctrl: Use devm_kcalloc()
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam: ctrl: Use devm_kcalloc()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 3/4] crypto: caam: ctrl: Use the preferred method for devm_kzalloc()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/4] crypto: caam: ctrl: Propagate the real error code
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/4] crypto: caam: ctrl: Fix the error handling
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - Add top-level skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - Add top-level skcipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [patch] crypto: qat - silence a static checker warning
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: un4i-ss-cipher.c warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: un4i-ss-cipher.c warning
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: hash - Add AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] crypto: support (de)compression API that doesn't require tfm object
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH v2 1/8] crypto: support (de)compression API that doesn't require tfm object
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] dmaengine: Add support for new feature CRC32C
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 1/8] crypto: support (de)compression API that doesn't require tfm object
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: Recent AEAD change: testmgr.c change needed?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: testmgr - Use new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: skcipher - Add top-level skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: skcipher - Introduce new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v1 2/4] dmaengine: xgene-dma: Add support for CRC32C calculation via DMA engine
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v1 1/4] dmaengine: Add support for new feature CRC32C
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v1 2/4] dmaengine: xgene-dma: Add support for CRC32C calculation via DMA engine
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 1/8] crypto: support (de)compression API that doesn't require tfm object
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: un4i-ss-cipher.c warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: un4i-ss-cipher.c warning
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/8] crypto/lzo: support decompress_noctx
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 3/8] crypyo/lz4: support decompress_noctx
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 4/8] crypto/lz4hc: support decompress_noctx
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 5/8] crypto/842: support decompress_noctx
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 6/8] zram: change zcomp_compress interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 7/8] zram: use crypto API for compression
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 8/8] zram: use decompress_noctx
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 1/8] crypto: support (de)compression API that doesn't require tfm object
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 0/8] zram: introduce crypto compress noctx API and use it on zram
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH v1 1/4] dmaengine: Add support for new feature CRC32C
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v1 2/4] dmaengine: xgene-dma: Add support for CRC32C calculation via DMA engine
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: un4i-ss-cipher.c warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] dmaengine: Add support for new feature CRC32C
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH] crypto: cmac - allow usage in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sahara: Use dmam_alloc_coherent
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- un4i-ss-cipher.c warning
- From: Michal Suchanek <hramrach@xxxxxxxxx>
- Re: cbc(aes-aesni) a givcipher?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Recent AEAD change: testmgr.c change needed?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: cbc(aes-aesni) a givcipher?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- cbc(aes-aesni) a givcipher?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Recent AEAD change: testmgr.c change needed?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: broken Kconfig option CRYPTO_NULL2
- From: Valentin Rothberg <valentinrothberg@xxxxxxxxx>
- Re: crypto: broken Kconfig option CRYPTO_NULL2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: broken Kconfig option CRYPTO_NULL2
- From: Valentin Rothberg <valentinrothberg@xxxxxxxxx>
- [PATCH] crypto: cmac - allow usage in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH] crypto: sahara: Use dmam_alloc_coherent
- From: Vaishali Thakkar <vthakkar1994@xxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 1/2] Fixing vmx-crypto AES-CTR counter bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for LS1021A
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [cryptodev:master 144/149] DockBook: Warning(include/crypto/aead.h): no structured comments found
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [cryptodev:master 144/149] DockBook: Warning(include/crypto/aead.h): no structured comments found
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 147/148] gcm.c:undefined reference to `crypto_put_default_null_skcipher'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: crypto/Konfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto/Konfig
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: caam - add support for LS1021A
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [cryptodev:master 144/146] drivers/crypto/nx/nx.h:153:39: warning: 'struct crypto_aead' declared inside parameter list
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 144/146] drivers/crypto/nx/nx.h:153:39: warning: 'struct crypto_aead' declared inside parameter list
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [cryptodev:master 139/146] crypto/aead.c:770: undefined reference to `crypto_get_default_null_skcipher'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 139/146] crypto/aead.c:770: undefined reference to `crypto_get_default_null_skcipher'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2] crypto: amcc: Do a NULL check for pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: jonghwa3.lee@xxxxxxxxxxx
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: Issues with HW RNG / SSS on Exynos 5422
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Issues with HW RNG on Exynos 5422
- From: Heiner Kallweit <hkallweit1@xxxxxxxxx>
- [PATCH 1/3] Move certificate handling to its own directory
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/3] modsign: Use if_changed rule for extracting cert from module signing key
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/3] modsign: Handle signing key in source tree
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/3] Move cert handling to certs/ directory
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] Fixing vmx-crypto GHASH Key issue on little endian
- From: Leonidas S Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] Fixing vmx-crypto AES-CTR counter bug
- From: Leonidas S Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [v2 PATCH 12/13] crypto: aead - Remove old AEAD interfaces
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/13] ipsec: Replace seqniv with seqiv
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: amcc: Do a NULL check for pointer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: amcc: Do a NULL check for pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: amcc: Do a NULL check for pointer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to the akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to the akcipher API
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/13] crypto: algboss - Remove reference to nivaead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] crypto: aead - Remove CRYPTO_ALG_AEAD_NEW flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/13] crypto: aead - Remove old AEAD interfaces
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/13] crypto: qat - Remove reference to crypto_aead_crt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/13] crypto: cryptd - Remove reference to crypto_aead_crt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/13] crypto: echainiv - Use generic geniv init/exit helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/13] crypto: aead - Add type-safe geniv init/exit helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/13] crypto: seqiv - Use generic geniv init/exit helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/13] crypto: echainiv - Remove AEAD compatibility code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/13] crypto: seqiv - Remove AEAD compatibility code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/13] crypto: seqiv - Remove seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/13] crypto: user - Remove crypto_lookup_aead call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/13] ipsec: Replace seqniv with seqiv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/13] crypto: aead - Complete AEAD conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH 2/2] zram: use crypto API to compress the page
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH 2/2] zram: use crypto API to compress the page
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH] crypto: caam - Remove unneeded 'ret' variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Fix error handling in caam_rng_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix simple_return.cocci warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 119/123] warning: (CRYPTO_DEV_QAT_DH895xCCVF) selects PCI_IOV which has unmet direct dependencies (PCI)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] ARM: sun6i: Support Security System crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] zram: use crypto API to compress the page
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH] crypto: caam - fix memory corruption in ahash_final_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH 2/2] zram: use crypto API to compress the page
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- [PATCH 1/2] crypto: KEYS: convert public key to the akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: qat - Don't move data inside output buffer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] crypto: KEYS: convert public key to the akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] zram: use crypto API to compress the page
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] zram: use crypto API to compress the page
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 1/2] crypto: export crypto_alg_list and rwsem
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH] crypto: caam - Remove unneeded 'ret' variable
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: caam - Fix error handling in caam_rng_init()
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - Fix error handling in caam_rng_init()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: fix simple_return.cocci warnings
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 118/125] drivers/crypto/qat/qat_common/adf_sriov.c:258:1-4: WARNING: end returns can be simpified and declaration on line 212 can be dropped
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [cryptodev:master 119/123] warning: (CRYPTO_DEV_QAT_DH895xCCVF) selects PCI_IOV which has unmet direct dependencies (PCI)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: caam - fix memory corruption in ahash_final_ctx
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [cryptodev:master 119/123] (.text+0x7a3): multiple definition of `adf_isr_resource_free'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix email address mistypo for NX/VMX crypto driver maintainers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx-sha256/512: respect sg limit bounds when building sg lists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 119/123] warning: (CRYPTO_DEV_QAT_DH895xCCVF) selects PCI_IOV which has unmet direct dependencies (PCI)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] ARM: dts: sun6i: Add security system crypto engine clock and device nodes
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- [PATCH 2/3] crypto: sunxi-ss: Add optional reset control support
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- [PATCH 1/3] crypto: sunxi-ss: Document optional reset control bindings
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- [PATCH 0/3] ARM: sun6i: Support Security System crypto engine
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- Re: [PATCH] crypto: sahara - Fix misuse of IS_ENABLED
- From: Axel Lin <axel.lin@xxxxxxxxxx>
- Re: [kbuild-all] [cryptodev:master 119/123] include/linux/pci.h:389:12: error: 'struct pci_dev' has no member named 'physfn'
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [cryptodev:master 119/123] (.text+0x7a3): multiple definition of `adf_isr_resource_free'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] Fix email address mistypo for NX/VMX crypto driver maintainers
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 119/123] include/linux/pci.h:389:12: error: 'struct pci_dev' has no member named 'physfn'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [cryptodev:master 119/123] warning: (CRYPTO_DEV_QAT_DH895xCCVF) selects PCI_IOV which has unmet direct dependencies (PCI)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] Removing CTR mode from NX driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update NX crypto driver maintainers and adding VMX maintainers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: qat - Add support for SRIOV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - make URL into hyperlink
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Prevent panic in probe error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] crypto: caam - Add i.MX6 support to the Freescale CAAM driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto/omap-sham: remove an open coded access to ->page_link
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: replace scatterwalk_sg_chain with sg_chain
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sahara - Fix misuse of IS_ENABLED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sahara - Fix misuse of IS_ENABLED
- From: Axel Lin <axel.lin@xxxxxxxxxx>
- [PATCH] Removing CTR mode from NX driver
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH] Update NX crypto driver maintainers and adding VMX maintainers
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] scatterlist: use sg_phys()
- From: "Williams, Dan J" <dan.j.williams@xxxxxxxxx>
- [PATCH] crypto: nx-sha256/512: respect sg limit bounds when building sg lists
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH 6/6] scatterlist: use sg_phys()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 5/5] PCI: Add quirk for Intel DH895xCC VF PCI config erratum
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/5] crypto: qat - Add support for SRIOV
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/5] crypto: qat - Add qat dh895xcc VF driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/5] crypto: qat - Move adf admin and adf hw arbitrer to common code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 4/5] crypto: qat - Add FW const table
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/5] crypto: qat - Add support for SRIOV
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- scatterlist cleanups
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 5/6] crypto/omap-sham: remove an open coded access to ->page_link
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/6] target/rd: always chain S/G list
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 3/6] crypto: replace scatterwalk_sg_chain with sg_chain
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 6/6] scatterlist: use sg_phys()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 4/6] scatterlist: remove open coded sg_unmark_end instances
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/6] scatterlist: allow limited chaining without ARCH_HAS_SG_CHAIN
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 05/14] crypto: caam - Change kmalloc to kzalloc to avoid residual data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - make URL into hyperlink
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- crypto: authencesn - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/31] crypto: use kmemdup rather than duplicating its implementation
- From: Andrzej Hajda <a.hajda@xxxxxxxxxxx>
- Re: [PATCH 09/31] crypto: use kmemdup rather than duplicating its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: authencesn - Fix breakage with new ESP code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] ASN.1 fixes
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 11/14] ARM: dts: mx6sx: Add CAAM device node
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [GIT PULL] ASN.1 fixes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4] ASN.1: Fix handling of CHOICE in ASN.1 compiler
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: doc - make URL into hyperlink
- From: Brian Norris <computersforpeace@xxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Prevent panic in probe error path
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- [PATCH v3 11/14] ARM: dts: mx6sx: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] ARM: dts: mx6sx: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] ARM: dts: mx6sx: Add CAAM device node
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] ASN.1: Fix handling of CHOICE in ASN.1 compiler
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] ASN.1: Fix handling of CHOICE in ASN.1 compiler
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2] crypto: talitos: Prevent panic in probe error path
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- [PATCH v2 05/14] crypto: caam - Change kmalloc to kzalloc to avoid residual data
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 03/14] crypto: caam - Enable and disable clocks on Freescale i.MX platforms
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 06/14] crypto: caam - Correct DMA unmap size in ahash_update_ctx()
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 07/14] crypto: caam - Use local sg pointers to walk the scatterlist
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 12/14] crypto: caam - Enable MXC devices to select CAAM driver in Kconfig
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 14/14] crypto: caam - Detect hardware features during algorithm registration
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 01/14] crypto: caam - Add cache coherency support
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 10/14] ARM: dts: mx6qdl: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 09/14] ARM: clk-imx6q: Add CAAM clock support
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 08/14] crypto: caam - Added clocks and clock-names properties to SEC4.0 device tree binding
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 02/14] crypto: caam - Add setbits32/clrbits32/clrsetbits primitives for ARM compatibility
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 13/14] ARM: imx_v6_v7_defconfig: Select CAAM
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 11/14] ARM: dts: mx6sx: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 00/14] crypto: caam - Add i.MX6 support to the Freescale CAAM driver
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2 04/14] crypto: caam - Modify Freescale CAAM driver Scatter Gather entry definition
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Prevent panic in probe error path
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- [GIT PULL] ASN.1 fixes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/4] ASN.1: Handle 'ANY OPTIONAL' in grammar
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] ASN.1: Fix non-match detection failure on data overrun
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/4] ASN.1: Fix actions on CHOICE elements with IMPLICIT tags
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/4] ASN.1: Fix handling of CHOICE in ASN.1 compiler
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Prevent panic in probe error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG?] crypto: caam: little/big endianness on ARM vs PPC
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Prevent panic in probe error path
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- crypto: authenc - Add Kconfig dependency on CRYPTO_NULL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 91/97] authenc.c:undefined reference to `crypto_put_default_null_skcipher'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: talitos: Remove zero_entry static initializer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: documentation - AEAD API conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix spelling mistake in dev_err error message
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Prevent panic in probe error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: talitos: Remove zero_entry static initializer
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Remove zero_entry static initializer
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Remove zero_entry static initializer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: talitos: Remove zero_entry static initializer
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: documentation - AEAD API conversion
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Limited usefulness of RSA set key function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Proposal for adding setpubkey callback to akcipher_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Proposal for adding setpubkey callback to akcipher_alg
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Limited usefulness of RSA set key function
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: fix spelling mistake in dev_err error message
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Init zero_entry more compatibly
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos: Prevent panic in probe error path
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: talitos: Init zero_entry more compatibly
- From: Aaron Sierra <asierra@xxxxxxxxxxx>
- Re: [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- RE: [PATCH 2/2] ath9k: export HW random number generator
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - fix rfc4106 encap shared descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] crypto: caam - Enable and disable clocks on Freescale i.MX platforms
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH 08/12] ARM: clk-imx6q: Add CAAM clock support
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] crypto: caam - Enable and disable clocks on Freescale i.MX platforms
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH v2] crypto: caam - fix rfc4106 encap shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] crypto: caam - Add i.MX6 support to the Freescale CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix rfc4106 encap shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix rfc4106 encap shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix rfc4106 encap shared descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx - don't err if compressed output > input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx - use be32_to_cpu for __be32 field in debug msg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: change 842 NX owner email address
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix rfc4106 encap shared descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - fix rfc4106 encap shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] Crypto: tcrypt: Add test case for APM X-Gene SoC CRC32C algo
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- [PATCH v1 0/4] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH v1 0/4] Crypto: tcrypt: Add test case for APM X-Gene SoC CRC32C algo
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH v1 2/4] dmaengine: xgene-dma: Add support for CRC32C calculation via DMA engine
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH v1 4/4] Crypto: tcrypt: Add test case for APM X-Gene SoC CRC32C algo
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH v1 3/4] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH v1 1/4] dmaengine: Add support for new feature CRC32C
- From: Rameshwar Prasad Sahu <rsahu@xxxxxxx>
- [PATCH 7/8] crypto: talitos - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/8] crypto: testmgr - Reenable authenc tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/8] crypto: qat - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/8] crypto: picoxcell - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/8] crypto: caam - Convert authenc to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/8] crypto: ixp4xx - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] crypto: authenc - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] crypto: testmgr - Disable authenc test and convert test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/8] crypto: aed - Convert authenc to new interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] ARM: clk-imx6q: Add CAAM clock support
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH 09/12] ARM: dts: mx6qdl: Add CAAM device node
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] crypto: caam - Enable and disable clocks on Freescale i.MX platforms
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 04/12] crypto: caam - Modify Freescale CAAM driver Scatter Gather entry definition
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 08/12] ARM: clk-imx6q: Add CAAM clock support
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 03/12] crypto: caam - Enable and disable clocks on Freescale i.MX platforms
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 10/12] ARM: dts: mx6sx: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 05/12] crypto: caam - Change kmalloc to kzalloc to avoid residual data
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 09/12] ARM: dts: mx6qdl: Add CAAM device node
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 07/12] crypto: caam - Use local sg pointers to walk the scatterlist
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 12/12] ARM: imx_v6_v7_defconfig: Select CAAM
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 11/12] crypto: caam - Enable MXC devices to select CAAM driver in Kconfig
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 06/12] crypto: caam - Correct DMA unmap size in ahash_update_ctx()
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 01/12] crypto: caam - Add cache coherency support
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 02/12] crypto: caam - Add setbits32/clrbits32/clrsetbits primitives for ARM compatibility
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH 00/12] crypto: caam - Add i.MX6 support to the Freescale CAAM driver
- From: Victoria Milhoan <vicki.milhoan@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: change 842 NX owner email address
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] crypto: nx - use be32_to_cpu for __be32 field in debug msg
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] crypto: nx - don't err if compressed output > input
- From: Dan Streetman <ddstreet@xxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: qat - remove unnecessary list iteration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] jent: use safe format string parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat Fix typo othewise->otherwise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix bug in ADF_RING_SIZE_BYTES_MIN macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove redundant struct elem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove unused define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: correct error check of kthread_run call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - remove unnecessary list iteration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Oleksij Rempel <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/14] crypto: add a new driver for Marvell's CESA
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] jent: use safe format string parameters
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] cleanups for crypto/wp512.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] code cleanups for crypto/blkcipher.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam - Enable MXC devices to select CAAM driver in Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] jent: use safe format string parameters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: qat - remove unused define
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - fix bug in ADF_RING_SIZE_BYTES_MIN macro
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat Fix typo othewise->otherwise
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - remove redundant struct elem
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam - Enable MXC devices to select CAAM driver in Kconfig
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH] cleanups for crypto/wp512.c
- From: Ahmed Mohamed Abd EL Mawgood <ahmedsoliman0x666@xxxxxxxxx>
- [PATCH] code cleanups for crypto/blkcipher.c
- From: Ahmed Mohamed Abd EL Mawgood <ahmedsoliman0x666@xxxxxxxxx>
- [PATCH] hwrng: correct error check of kthread_run call
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] remove 'platform' shared NX driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - Don't attempt to register algorithm multiple times
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix invalid synchronization between register/unregister sym algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: DocBook update: skip the akcipher for now?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix invalid check for keylen in fips mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_akcipher user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_akcipher user space interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- DocBook update: skip the akcipher for now?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_akcipher user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/8] crypto: nx - remove __init/__exit from VIO functions
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 2/8] crypto: nx - remove pSeries NX 'status' field
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 3/8] crypto: nx - move kzalloc() out of spinlock
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 4/8] crypto: nx - don't register pSeries driver if ENODEV
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 5/8] crypto: nx - use common code for both NX decompress success cases
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 6/8] crypto: nx - merge nx-compress and nx-compress-crypto
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 7/8] crypto: nx - rename nx-842-crypto.c to nx-842.c
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 8/8] crypto: nx - make platform drivers directly register with crypto
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH 0/8] remove 'platform' shared NX driver
- From: Dan Streetman <ddstreet@xxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_akcipher user space interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix invalid check for keylen in fips mode
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- crypto: ixp4xx - Remove bogus BUG_ON on scattered dst buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: qat - Fix invalid synchronization between register/unregister sym algs
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: qat - Don't attempt to register algorithm multiple times
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/3] AF_ALG interface for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: af_alg - add sig gen / verify API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/3] AF_ALG interface for akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/3] crypto: algif_akcipher user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] crypto: algif_akcipher - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix invalid check for RSA keylen in fips mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix invalid check for keylen in fips mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Don't attempt to register algorithm multiple times
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Don't attempt to register algorithm multiple times
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - fix invalid check for RSA keylen in fips mode
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: rsa - fix invalid check for keylen in fips mode
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - Add support for RSA algorithm
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - Add support for RSA algorithm
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- re: crypto: qat - Add support for RSA algorithm
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - fix ERA property reading
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 03/17] crypto: caam: Blacklist CAAM when kexec is enabled
- From: Scott Wood <scottwood@xxxxxxxxxxxxx>
- [PATCH v11] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v11 1/5] ARM: sun4i: dt: Add Security System to A10 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v11 3/5] ARM: sun4i: dt: Add DT bindings documentation for SUN4I Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v11 2/5] ARM: sun7i: dt: Add Security System to A20 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v11 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v11 5/5] MAINTAINERS: Add myself as maintainer of Allwinner Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/4] crypto: caam - fix warning in APPEND_MATH_IMM_u64
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - fix RNG init descriptor ret. code checking
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam - fix snooping for write transactions
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - fix ERA property reading
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: qat - add RSA support to qat driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: poly1305 - Add a four block AVX2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 09/10] crypto: poly1305 - Add a two block SSE2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 08/10] crypto: poly1305 - Add a SSE2 SIMD variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 05/10] crypto: chacha20 - Add an eight block AVX2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 02/10] crypto: chacha20 - Export common ChaCha20 helpers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 06/10] crypto: testmgr - Add a longer ChaCha20 test vector
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 03/10] crypto: chacha20 - Add a SSSE3 SIMD variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 01/10] crypto: tcrypt - Add ChaCha20/Poly1305 speed tests
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 04/10] crypto: chacha20 - Add a four block SSSE3 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH v2 07/10] crypto: poly1305 - Export common Poly1305 helpers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: crypto: chacha20poly1305 - Convert to new AEAD interface
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- crypto: chacha20poly1305 - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] crypto: rsa - limit supported key lengths
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 3/4] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 2/4] crypto: qat - add MMP FW support to accel engine
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/4] crypto: qat - add support for MMP FW
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/4] crypto: qat - add RSA support to qat driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 6/6] nx-842-platform: if NX842 platform drivers are not modules, don't try to load them
- From: Dan Streetman <ddstreet@xxxxxxxxxx>
- Re: [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Dan Streetman <ddstreet@xxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: qat - add MMP FW support to accel engine
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/3] crypto: qat - add RSA support to qat driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/3] crypto: qat - add support for MMP FW
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 3/5] crypto: aes-ce-ccm - Convert to new AEAD interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] crypto: testmgr - Reenable rfc4309 test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] crypto: nx - Convert ccm to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] crypto: aes-ce-ccm - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] crypto: ccm - Convert to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] crypto: testmgr - Disable rfc4309 test and convert test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] crypto: aead - Convert ccm to new interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Uncomment VSX enable routine for instructions access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Drop owner assignment from platform_driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: qat - Add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] Adding enable_kernel_vsx() to access VSX instructions
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] Uncomment and make enable_kernel_vsx() routine available
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Uncomment VSX enable routine for instructions access
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] crypto: qat - Add support for RSA algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/3] crypto: qat - add MMP FW support to accel engine
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: qat - add RSA support to qat driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: qat - add support for MMP FW
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: akcipher: continuous memory for input/output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Drop owner assignment from platform_driver
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Drop owner assignment from platform_driver
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 9/14] crypto: tcrypt - Add support for new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/14] crypto: tcrypt - Add support for new IV convention
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 12/14] crypto: nx - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/14] crypto: nx - Use new IV convention
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH v10 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/14] crypto: nx - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH v10 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 12/14] crypto: nx - Use new IV convention
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 13/14] crypto: caam - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/14] crypto: testmgr - Reenable rfc4106 test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/14] crypto: nx - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/14] crypto: gcm - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/14] crypto: aesni - Use new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/14] crypto: tcrypt - Add support for new IV convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/14] crypto: testmgr - Disable rfc4106 test and convert test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/14] crypto: aead - Propagate new AEAD implementation flag for IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/14] crypto: seqiv - Replace seqniv with seqiv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/14] crypto: echainiv - Fix encryption convention
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/14] crypto: cryptd - Propagate new AEAD implementation flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/14] crypto: pcrypt - Propagate new AEAD implementation flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/14] crypto: aead - Add type-safe function for freeing instances
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/14] crypto: api - Add instance free function to crypto_type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/14] crypto: aead - Phase oute seqniv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: akcipher: continuous memory for input/output
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: akcipher: continuous memory for input/output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- akcipher: continuous memory for input/output
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: nx - Fix reentrancy bugs
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- crypto: nx/842 - Fix context corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: omap-aes: Add support for GCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 5/7] crypto: aead: Add aead_request_cast() api
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: aead - Add aead_queue interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: aead: Add aead_request_cast() api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: aead - Add aead_queue interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: api - Remove unused __crypto_dequeue_request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: nx - Fix reentrancy bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/10] crypto: poly1305 - Add a four block AVX2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 05/10] crypto: chacha20 - Add an eight block AVX2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 04/10] crypto: chacha20 - Add a four block SSSE3 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 03/10] crypto: chacha20 - Add a SSSE3 SIMD variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 01/10] crypto: tcrypt - Add ChaCha20/Poly1305 speed tests
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 06/10] crypto: testmgr - Add a longer ChaCha20 test vector
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 09/10] crypto: poly1305 - Add a two block SSE2 variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 07/10] crypto: poly1305 - Export common Poly1305 helpers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 00/10] crypto: x86_64 - Add SSE/AVX2 ChaCha20/Poly1305 ciphers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 08/10] crypto: poly1305 - Add a SSE2 SIMD variant for x86_64
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 02/10] crypto: chacha20 - Export common ChaCha20 helpers
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: crypto: nx - Fix reentrancy bugs
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/7] crypto: omap-aes: Fix CTR mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 0/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 3/7] crypto: omap-aes: Fix configuring of AES mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 7/7] crypto: tcrypt: Fix AEAD speed tests
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 6/7] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 5/7] crypto: aead: Add aead_request_cast() api
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 2/7] crypto: omap-aes: Increase priority of hw accelerator
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH v2 4/7] crypto: omap-aes: Use BIT() macro
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v10 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/nx-842-{powerpc,pseries}: reduce chattiness of platform drivers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add a chunking test for cbc(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/nx-842-{powerpc,pseries}: reduce chattiness of platform drivers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- crypto: nx - Fix reentrancy bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/5] ARM: sun4i: dt: Add Security System to A10 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v10 3/5] ARM: sun4i: dt: Add DT bindings documentation for SUN4I Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v10 2/5] ARM: sun7i: dt: Add Security System to A20 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v10 5/5] MAINTAINERS: Add myself as maintainer of Allwinner Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v10 4/5] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v10] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 6/6] nx-842-platform: if NX842 platform drivers are not modules, don't try to load them
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto/nx-842-{powerpc,pseries}: reduce chattiness of platform drivers
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - add a chunking test for cbc(aes)
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- crypto: cryptd - Fix AEAD request context corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] crypto: tcrypt: Added speed tests for Async AEAD crypto alogrithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] crypto: tcrypt: Added speed tests for Async AEAD crypto alogrithms
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH] crypto: arm: ignore generated SHA2 assembly files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] drivers/nx-842: reduce verbosity of logging
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Provide support to autoload CCP driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix unmapping of dma channels
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 6/6] nx-842-platform: if NX842 platform drivers are not modules, don't try to load them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] crypto: tcrypt: Added speed tests for Async AEAD crypto alogrithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/10] crypto: omap-aes: Use BIT() macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: aead: Add aead_request_cast() api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: omap-aes: Add support for lengths not aligned with AES_BLOCK_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm: ignore generated SHA2 assembly files
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm: ignore generated SHA2 assembly files
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- crypto: marvell/CESA: Issues with non cache-line aligned buffers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 4/6] crypto/nx-842-{powerpc,pseries}: only load on the appropriate machine type
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 6/6] nx-842-platform: if NX842 platform drivers are not modules, don't try to load them
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] [RFC] crypto/testmgr: add null test for 842 algorithm
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto/nx-842-{powerpc,pseries}: only load on the appropriate machine type
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] nx-842-pseries: do not emit extra output if status is disabled
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] nx-842-pseries: rename nx842_{init,exit} to nx842_pseries_{init,exit}
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto/nx-842-pseries: nx842_OF_upd_status should return ENODEV if device is not 'okay'
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] drivers/nx-842: reduce verbosity of logging
- From: Nishanth Aravamudan <nacc@xxxxxxxxxxxxxxxxxx>
- using 3des with ipsec transport mode
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- [PATCH] crypto: omap-des: Fix unmapping of dma channels
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 09/10] crypto: omap-aes: gcm: Add support for PIO mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 06/10] crypto: omap-aes: gcm: Handle inputs properly
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 05/10] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 03/10] crypto: aead: Add aead_request_cast() api
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Fix configuring of AES mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 01/10] crypto: omap-aes: Add support for lengths not aligned with AES_BLOCK_SIZE
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH 09/10] crypto: omap-aes: gcm: Add support for PIO mode
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 07/10] crypto: omap-aes: gcm: Add support for unaligned lengths
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 06/10] crypto: omap-aes: gcm: Handle inputs properly
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 05/10] crypto: omap-aes: Add support for GCM mode
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 04/10] crypto: omap-aes: Use BIT() macro
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 03/10] crypto: aead: Add aead_request_cast() api
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Fix configuring of AES mode
- From: Felipe Balbi <balbi@xxxxxx>
- Re: [PATCH 01/10] crypto: omap-aes: Add support for lengths not aligned with AES_BLOCK_SIZE
- From: Felipe Balbi <balbi@xxxxxx>
- [PATCH 08/10] crypto: omap-aes: gmc: Add algo info
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 09/10] crypto: omap-aes: gcm: Add support for PIO mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 06/10] crypto: omap-aes: gcm: Handle inputs properly
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 01/10] crypto: omap-aes: Add support for lengths not aligned with AES_BLOCK_SIZE
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 05/10] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 10/10] crypto: tcrypt: Added speed tests for Async AEAD crypto alogrithms
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 07/10] crypto: omap-aes: gcm: Add support for unaligned lengths
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 03/10] crypto: aead: Add aead_request_cast() api
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 04/10] crypto: omap-aes: Use BIT() macro
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 02/10] crypto: omap-aes: Fix configuring of AES mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 00/10] crypto: omap-aes: Add support for GCM mode
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH] crypto: ccp - Provide support to autoload CCP driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto-qat: Deletion of unnecessary checks before two function calls
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: akcipher use
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: Crypto Fixes for 4.2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: akcipher use
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] QAT: Fix uninitialized variable in qat driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Crypto Fixes for 4.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]