Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- GCM aesni and 192/256-bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: omap-des: fix BUG_ON condition
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- crypto: qat - Fix incorrect uses of memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- [PATCH v7 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Remove unnecessary KERN_ERR in bfin_crc.c
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: amcc: crypto4xx_sa.c: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Vinson Lee <vlee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG: zeroize key data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 2/4] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: AF_ALG: zeroize key data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] hwrng: core - Drop current rng in set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] hwrng: core - Move hwrng_init call into set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [0/5] hwrng: Fix kref warning and underlying bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: ablkcipher - fixed style errors in ablkcipher.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg: fix backlog handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] MIPS: OCTEON: crypto: add instruction definitions for MD5
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 1/5] MIPS: OCTEON: add crypto helper functions
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 5/5] crypto: enable OCTEON MD5 module selection
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 4/5] MIPS: OCTEON: crypto: add MD5 module
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 3/5] MIPS: OCTEON: reintroduce crypto features check
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: af_alg: fix backlog handling
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [QUESTION] How is the backlog supposed to be used?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: ux500: fix checkpatch errors
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Fix assumption that sg in and out will have the same nents
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v5 REPOST 4/6] hw_random: fix unregister race.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 1/6] hw_random: place mutex around read functions and buffers.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 5/6] hw_random: don't double-check old_rng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 3/6] hw_random: use reference counts on each struct hwrng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 2/6] hw_random: move some code out mutex_lock for avoiding underlying deadlock
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 6/6] hw_random: don't init list element we're about to add to list.
- From: Amos Kong <akong@xxxxxxxxxx>
- Re: [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v5 6/8] crypto: AF_ALG: zeroize key / seed data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 4/8] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 24/25] crypto: ansi_cprng - Introduce non-deterministic mode
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 11/25] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 16/25] crypto: testmgr - Report failure on zero-length crypto_rng_get_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 21/25] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 15/25] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 22/25] crypto: ansi_cprng - Tweak comments
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 23/25] crypto: ansi_cprng - Introduce a "union cipherblock"
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 20/25] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 19/25] crypto: ansi_cprng - simplify get_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 14/25] crypto: tcrypt - Add const qualifiers all over the test code.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 12/25] crypto: ansi_cprng - Get rid of rdata buffer in fips_cprng_reset
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 09/25] crypto: ansi_cprng - Make length types consistent
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 18/25] crypto: testmgr - Add CPRNG stutter test.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 17/25] crypto: testmgr - Don't crash if CPRNG test result is large
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 10/25] crypto: ansi_cprng - Use u8 data types consistently internally
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 06/25] crypto: ansi_cprng - Make cont_test a bool
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 08/25] crypto: ansi_cprng - Don't call reset_prng_context from cprng_init
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 07/25] crypto: ansi_cprng - Shrink context some more
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 03/25] crypto: ansi_cprng - Use %phN rather than print_hex_dump for debug
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 04/25] crypto: ansi_cprng - Make debug output more like NIST test vectors
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 02/25] crypto: ansi_cprng - Additional _get_more_prng_bytes cleanup
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 01/25] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: George Spelvin <linux@xxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in ahash.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in af_alg.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in aead.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style erro in algapi.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in ahash.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in af_alg.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in aead.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: tcrypt - Allow speed testing of arbitrary hash functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 0/5] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 5/5] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- re: crypto: qat - Intel(R) QAT transport code
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 17/17] crypto: ansi_cprng - Shrink default seed size
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 16/17] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 15/17] crypto: testmgr - Teach test_cprng to handle non-default seed sizes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 14/17] crypto: ansi_cprng - If DT is omitted, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 12/17] crypto: ansi_cprng - Create a "block buffer" data type
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 10/17] crypto: ansi_cprng - simplify get_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 09/17] crypto: ansi_cprng - Clean up some variable types
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 08/17] crypto: ansi_cprng - Require non-null key & V in reset_prng_context
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 06/17] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 05/17] crypto: ansi_cprng - Add const annotations to hexdump()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- PATCH 04/17] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - removed unneeded code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [QUESTION] How is the backlog supposed to be used?
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] crypto: sahara - replace tasklets with kthread
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: sahara - fix spinlock initialization
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 2/4] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - removed unneeded code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: algif_skcipher - Fixed blocking recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- crypto: algif_skcipher - Fixed blocking recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3] crypto: include crypto- module prefix in template
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - add MODULE_ALIAS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: user - add MODULE_ALIAS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [patch] crypto: sha-mb - remove a bogus NULL check
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/9] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/7] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/7] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH RESEND v2 2/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 4/4] ARM: at91/dt: add trng node to at91sam9g45
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- RE: [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH RESEND 4/4] ARM: at91/dt: add trng node
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 2/4] hwrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] crypto: Fix a typo in ahash.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH V2 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- RE: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: Fix a typo in ahash.c
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 2/2] kernel/kexec: free crypto_shash using crypto_free_shash
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Documentation - document uncovered member variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/10] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/10] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/10] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/10] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/10] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/10] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/10] crypto: AF_ALG: user space interface for hash info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: qat - Use memzero_explicit
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Documentation - document uncovered member variables
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: zeroization of buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Luis Henriques <luis.henriques@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/8] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/8] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/8] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 6/8] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- [PATCH v3 12/13] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 11/13] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 09/13] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 08/13] crypto: Documentation - cipher data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 07/13] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 06/13] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 05/13] crypto: Documentation - hash data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 04/13] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 03/13] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 01/13] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 02/13] crypto: Documentation - compile crypto API spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 10/13] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 13/13] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [QUESTION] Crypto queue handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: Asynchronous usage of PCOMPRESS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: zeroization of buffers
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: AF_ALG - zeroize IV buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Asynchronous usage of PCOMPRESS
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher: check for IV size superfluous?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Crypto Fixes for 3.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- libkcapi: First release of kernel crypto API userspace library
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- crypto: algif_skcipher: check for IV size superfluous?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- [PATCH RFC 3/4] crypto: qat - Add userspace instances
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 1/4] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 0/4] crypto: qat - Add userspace access to QAT services
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 2/4] crypto: qat - Add PKE firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] NX crypto driver fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500/hash: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH v2] arm64/crypto: use crypto instructions to generate AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Steve Capper <steve.capper@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/11] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/11] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/11] crypto: Documentation - documentation of crypto_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/11] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/11] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/11] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 11/11] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] crypto: caam - add support for rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 8/9] Fixing the limit number of bytes to be processed
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/9] Fix SHA concurrence issue and sg limit bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/9] Moving NX-AES-XCBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/9] Moving NX-AES-GCM to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/9] Moving NX-AES-ECB to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] Moving limit and bound logic in CTR and fix IV vector
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/9] Moving NX-AES-CCM to be processed logic and sg_list bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/9] Moving NX-AES-CBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/9] NX crypto driver fixes
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup unnecessary break checkpatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup coccicheck warning - NULL check before freeing functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: fix bad unlock balance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use crypto_inc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 0/3] crypto: sahara - SHA1/256 support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] crypto: sahara - initialize spinlock
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] caam: caamalg - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Crestez Dan Leonard <cdleonard@xxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v3 01/59] crypto: ux500: Use dmaengine_terminate_all API
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Valentin Rothberg <valentinrothberg@xxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [linux-sunxi] [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: Koen Kooi <koen@xxxxxxxxxxxxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/4] ARM: sun7i: dt: Add Security System to A20 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]