Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 5/5] crypto: talitos: Add software backlog queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH v2 4/5] crypto: talitos: Reorganize request submission data structures
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH v2 3/5] crypto: talitos: Fix off-by-one and use all hardware slots
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH v2 2/5] crypto: talitos: Remove MD5_BLOCK_SIZE
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH v2 1/5] crypto: talitos: Simplify per-channel initialization
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH v2 0/5] crypto: talitos: Add crypto async queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH 3/4] crypto: caamhash: add two missed dma_mapping_error
- From: yjin <yanjiang.jin@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: caamhash: replace kmalloc with kzalloc
- From: yjin <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caamhash: - fix uninitialized edesc->sec4_sg_bytes field
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: caam: fix some compile warnings
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: caam_rng: fix rng_unmap_ctx's DMA_UNMAP size problem
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 0/3] fix some CAAM warnings.
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caamhash: add two missed dma_mapping_error
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: caam_rng: fix rng_unmap_ctx's DMA_UNMAP size problem
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: caamhash: replace kmalloc with kzalloc
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam: fix some compile warnings
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [v1,1/3] crypto: powerpc/sha1 - assembler
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: crypto: update NEON AES module to latest OpenSSL version
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: crypto: update NEON AES module to latest OpenSSL version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto: drbg: performance improvements
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: drbg: remove superflowous memsets
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/2] crypto: drbg: use single block cipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v1 3/3] crypto: powerpc/md5 - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 2/3] crypto: powerpc/md5 - glue
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 1/3] crypto: powerpc/md5 - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 0/3] crypto: powerpc/md5
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH 0/4] hw_random: bcm63xx-rng: misc cleanups and reorg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2,1/7] crypto: powerpc/aes - register defines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3] hwrng: omap - Change RNG_CONFIG_REG to RNG_CONTROL_REG when, checking and disabling TRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: talitos: Remove MD5_BLOCK_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM / seqiv and SP800-38D
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: crypto: update NEON AES module to latest OpenSSL version
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH] crypto: fix typo in dev_err error message
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v13 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v13 0/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v13 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 05/10] ARM: dts: omap3 hs: Remove timer12
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 06/10] ARM: dts: omap3: Add missing dmas for crypto
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/10] ARM: dts: Remove files omap34xx-hs.dtsi and omap36xx-hs.dtsi
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 09/10] ARM: dts: omap3-tao3530: Include directly omap34xx.dtsi
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 08/10] ARM: dts: n900: Enable omap sham and include directly omap34xx.dtsi
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 04/10] crypto: omap-sham: Check for return value from pm_runtime_get_sync
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/10] crypto: omap-sham: Add support for omap3 devices
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 02/10] ARM: OMAP3: Fix crypto support for HS devices
- From: Pavel Machek <pavel@xxxxxx>
- Re: GCM / seqiv and SP800-38D
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GCM / seqiv and SP800-38D
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: mxs-dcp - fix type of ret for wait_for_completion_timeout
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/7] Add VMX module for PPC64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt speed: fix filter for aead algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caamhash: replace kmalloc with kzalloc
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam_rng: fix rng_unmap_ctx's DMA_UNMAP size problem
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caamhash: add two missed dma_mapping_error
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam: fix some compile warnings
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- Re: [dm-crypt] cryptsetup problem on Raspberry Pi 2 w 512bit key-size (works on Raspberry Pi 1, x86_64, 256bit)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH RESEND 2/2] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND 1/2] crypto: af_alg - Allow to link sgl
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND 0/2] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: Documentation - describe internal structure
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: talitos: Add AES-XTS Support
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] omap3 crypto fixes
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: [PATCH 2/5] crypto: talitos: Remove MD5_BLOCK_SIZE
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt speed: fix filter for aead algorithms
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: sha-mb: Fix big integer constant sparse warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] crypto: ccp - CCP driver updates 2015-01-28
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2,1/3] crypto: ppc/sha256 - assembler
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt speed: fix filter for aead algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] omap3 crypto fixes
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: [PATCH 5/5] crypto: talitos: Add software backlog queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- How to deal with backlog messages in crypto driver
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- [PATCH 00/10] omap3 crypto fixes
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 01/10] ARM: OMAP2+: Return correct error values from device and hwmod
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 02/10] ARM: OMAP3: Fix crypto support for HS devices
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 03/10] crypto: omap-sham: Add support for omap3 devices
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 04/10] crypto: omap-sham: Check for return value from pm_runtime_get_sync
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 05/10] ARM: dts: omap3 hs: Remove timer12
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 06/10] ARM: dts: omap3: Add missing dmas for crypto
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 07/10] ARM: dts: n9/n950: Enable omap crypto support
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 08/10] ARM: dts: n900: Enable omap sham and include directly omap34xx.dtsi
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 09/10] ARM: dts: omap3-tao3530: Include directly omap34xx.dtsi
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH 10/10] ARM: dts: Remove files omap34xx-hs.dtsi and omap36xx-hs.dtsi
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [PATCH] ARM: crypto: update NEON AES module to latest OpenSSL version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- AW: [PATCH v1 1/3] SHA1 for PPC/SPE - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- RE: [PATCH v1 1/3] SHA1 for PPC/SPE - assembler
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pavel Machek <pavel@xxxxxx>
- multiple simultaneous crypto sessions from a crypto driver
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- [PATCH v1 3/3] SHA1 for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 2/3] SHA1 for PPC/SPE - glue
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 1/3] SHA1 for PPC/SPE - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 0/3] SHA1 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: talitos: Add software backlog queue handling
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: [dm-crypt] cryptsetup problem on Raspberry Pi 2 w 512bit key-size (works on Raspberry Pi 1, x86_64, 256bit)
- From: Johannes Ernst <johannes.ernst@xxxxxxxxx>
- Re: [dm-crypt] cryptsetup problem on Raspberry Pi 2 w 512bit key-size (works on Raspberry Pi 1, x86_64, 256bit)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- How to test Export and Imports methods in a crypto driver
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: GCM / seqiv and SP800-38D
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: communicating from the user space
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: communicating from the user space
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: communicating from the user space
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- [PATCH v2 7/7] AES for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 6/7] AES for PPC/SPE - glue code
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 5/7] AES for PPC/SPE - ECB/CBC/CTR/XTS modes
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 4/7] AES for PPC/SPE - key handling
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 3/7] AES for PPC/SPE - assembler core
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 2/7] AES for PPC/SPE - aes tables
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 1/7] AES for PPC/SPE - register defines
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 0/7] AES for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: communicating from the user space
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intermediate Hash states
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intermediate Hash states
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- communicating from the user space
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: Intermediate Hash states
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: talitos: Add crypto async queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 2/2] crypto: talitos: Add AES-XTS Support
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 1/2] crypto: talitos: Clean ups and comment fixes for ablkcipher commands
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 0/2] crypto: talitos: Add AES-XTS mode
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 5/5] crypto: talitos: Add software backlog queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 4/5] crypto: talitos: Reorganize request submission data structures
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 3/5] crypto: talitos: Fix off-by-one and use all hardware slots
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 2/5] crypto: talitos: Remove MD5_BLOCK_SIZE
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 1/5] crypto: talitos: Simplify per-channel initialization
- From: Martin Hicks <mort@xxxxxxxx>
- [PATCH 0/5] crypto: talitos: Add crypto async queue handling
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH] arm64: crypto: increase AES interleave to 4x
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64: crypto: increase AES interleave to 4x
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: Intermediate Hash states
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- [PATCH v3] omap-rng: Change RNG_CONFIG_REG to RNG_CONTROL_REG when, checking and disabling TRNG
- From: Andre Wolokita <andre.wolokita@xxxxxxxxxx>
- [PATCH v2] omap-rng: Change RNG_CONFIG_REG to RNG_CONTROL_REG in init
- From: Andre Wolokita <andre.wolokita@xxxxxxxxxx>
- [PATCH] omap-rng: Change RNG_CONFIG_REG to RNG_CONTROL_REG in init
- From: Andre Wolokita <andre.wolokita@xxxxxxxxxx>
- [PATCH] arm64: crypto: increase AES interleave to 4x
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Intermediate Hash states
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- GCM / seqiv and SP800-38D
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Nokia N900: omap aes is broken
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] hw_random: bcm63xx-rng: move register definitions to driver
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [BISECTED] 4943ba16 ("include crypto- module prefix") breaks wifi
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 2/4] hw_random: bcm63xx-rng: move register definitions to driver
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 0/4] hw_random: bcm63xx-rng: misc cleanups and reorg
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 3/4] MIPS: BCM63xx: remove RSET_RNG register definitions
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 4/4] hw_random: bcm63xx-rng: use devm_* helpers
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/4] hw_random: bcm63xx-rng: drop bcm_{readl,writel} macros
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [ANNOUNCE] 3.18.7-rt1
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- AW: [PATCH v1 2/7] AES for PPC/SPE - aes tables
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- RE: [PATCH v1 2/7] AES for PPC/SPE - aes tables
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 2/7] AES for PPC/SPE - aes tables
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 7/7] AES for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 6/7] AES for PPC/SPE - glue code
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 5/7] AES for PPC/SPE - ECB/CBC/CTR/XTS modes
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 4/7] AES for PPC/SPE - key handling
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 3/7] AES for PPC/SPE - assembler core
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 2/7] AES for PPC/SPE - aes tables
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 1/7] AES for PPC/SPE - register defines
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 0/7] AES for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Crypto Update for 3.20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- fallback mechanism in HASH drivers implimentetion
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- Re: AW: AW: Best way to align key in AES context
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Understanding HASH(SHA) Driver implementation
- From: sri sowj <srisowj4linux@xxxxxxxxx>
- AW: AW: Best way to align key in AES context
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: AF_ALG interface not marking the end of the scatter-gather list
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: AW: Best way to align key in AES context
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: AF_ALG interface not marking the end of the scatter-gather list
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- AF_ALG interface not marking the end of the scatter-gather list
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- AW: Best way to align key in AES context
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: rfc4543 testvectors in testmgr.h kernel
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: rfc4543 testvectors in testmgr.h kernel
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Announce loop-AES-v3.7c file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH RFC v2] crypto: sahara: pass on error condition
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- [PATCH 2/2 RFC] crypto: sahara: pass on error condition
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- [PATCH 1/2] crypto: sahara: fix type of ret for wait_for_completion_timeout
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- [PATCH] crypto: sahara: drop unnecessary default assignment
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- [PATCH] crypto: mxs-dcp: fix type of ret for wait_for_completion_timeout
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCHv2 7/7] Enabling VMX module for PPC64
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 6/7] Add support for VMS instructions by ASM
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 5/7] Adding GHASH routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 4/7] Adding CTR routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 3/7] Adding CBC routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 2/7] Adding AES routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 1/7] Adding VMX module for Power 8
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCHv2 0/7] Add VMX module for PPC64
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] Enabling VMX module for PPC64
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] Enabling VMX module for PPC64
- From: Paul Bolle <pebolle@xxxxxxxxxx>
- [PATCH 6/7] Add support for VMS instructions by ASM
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] Enabling VMX module for PPC64
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/7] Adding GHASH routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/7] Adding CTR routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/7] Adding CBC routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] Adding AES routines for VMX module
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/7] Adding VMX module for Power 8
- From: "Marcelo H. Cerri" <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/7] Add VMX module for PPC64
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: sha-mb: Fix big integer constant sparse warning
- From: Lad Prabhakar <prabhakar.csengg@xxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: do not allocate iv on stack for aead speed tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/5] crypto: ccp - CCP driver updates 2015-01-28
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 3/5] crypto: ccp - Use dma_set_mask_and_coherent to set DMA mask
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 4/5] crypto: ccp - Convert calls to their devm_ counterparts
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 2/5] crypto: ccp - Update CCP build support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 1/5] crypto: ccp - Updates for checkpatch warnings/errors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 5/5] crypto: ccp - Add ACPI support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: tcrypt speed: fix filter for aead algorithms
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: algif - change algif_skcipher to be asynchronous
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 12/18] crypto: switch af_alg_make_sg() to iov_iter
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: make public_key_subtype data structure read only
- From: zibo zhao <chinabull@xxxxxxxxx>
- Re: [PATCH 0/3] crypto: algif - change algif_skcipher to be asynchronous
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/3] net: socket: enable async read and write
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 3/3] SHA256 for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 2/3] SHA256 for PPC/SPE - glue
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 1/3] SHA256 for PPC/SPE - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v2 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- AW: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: "Conor O'Gorman" <i@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: af_alg - Allow to link sgl
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] net: socket: enable async read and write
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/3] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v12 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v12 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v12 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH] MPILIB: avoid assembler warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] MPILIB: avoid assembler warning
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: tcrypt: do not allocate iv on stack for aead speed tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: limit IV copy length in aead tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH] crypto: tcrypt: fix buflen reminder calculation
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: omap: Free memory in error path
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] crypto: omap: Free memory in error path
- From: Christophe Jaillet <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH repost] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam: pair irq map and dispose in the same function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam: remove dead code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: replace scatterwalk_sg_next with sg_next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Free memory in error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v1 2/3] SHA256 for PPC/SPE - glue
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 3/3] SHA256 for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 1/3] SHA256 for PPC/SPE - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto/testmgr: mark rfc4106(gcm(aes)) as fips_allowed
- From: Stephan Mueller <smueller@xxxxxxxxx>
- [PATCH] crypto/testmgr: mark rfc4106(gcm(aes)) as fips_allowed
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: caam: fix resource clean-up on error path for caam_jr_init
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: pair irq map and dispose in the same function
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Andrey Ryabinin <a.ryabinin@xxxxxxxxxxx>
- [PATCH 2/2] crypto: caam: remove unused local variable
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: remove dead code
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Documentation: remove colons in comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH repost] virtio_rng: drop extra empty line
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] crypto: replace scatterwalk_sg_next with sg_next
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel: Free memory in error path
- From: Christophe Jaillet <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Documentation: remove colons in comments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Documentation: remove colons in comments
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: seqiv - Ensure that IV size is at least 8 bytes
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: crypto: cts - Remove bogus use of seqiv
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- crypto: seqiv - Ensure that IV size is at least 8 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: cts - Weed out non-CBC algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- crypto: cts - Remove bogus use of seqiv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - don't need qat_auth_state struct
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - don't need qat_auth_state struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v10 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- Re: crypto: qat - Ensure ipad and opad are zeroed
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- crypto: qat - Ensure ipad and opad are zeroed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- RE: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: "McCaffrey, Timothy M" <Timothy.McCaffrey@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 1/6] crypto: add missing crypto module aliases
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: qat - fix device reset flow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: module alias fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: don't use interruptible wait in tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- RE: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: "McCaffrey, Timothy M" <Timothy.McCaffrey@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Timothy McCaffrey <timcaffrey420@xxxxxxxxx>
- Re: [PATCH 5/6] crypto: sparc64/md5 - fix module description
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] crypto: sparc64/des - add "des3_ede" module alias
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sparc64/camellia - fix module alias
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: sparc64/aes - fix module description
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 6/6] crypto: x86/des3_ede - drop bogus module aliases
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: sparc64/md5 - fix module description
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: sparc64/aes - fix module description
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: sparc64/des - add "des3_ede" module alias
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: sparc64/camellia - fix module alias
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: add missing crypto module aliases
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: module alias fixes
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: qat - adf_ae_stop() is never called
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - remove unnecessary include of atomic.h header file
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - use pci_wait_for_pending_transaction()
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - correctly type a boolean
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - fix device reset flow
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: don't use interruptible wait in tests
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib: memzero_explicit: add comment for its usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: fix BUG_ON condition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v8 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] s390: crypto: aes_s390: Remove 'const' to avoid compiler warnings
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM aesni and 192/256-bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- [PATCH] lib: memzero_explicit: add comment for its usage
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: crypto: qat - Fix incorrect uses of memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM aesni and 192/256-bit keys
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - Fix incorrect uses of memzero_explicit
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: amcc: crypto4xx_sa.c: Remove unused function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_ERR in bfin_crc.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- GCM aesni and 192/256-bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: omap-des: fix BUG_ON condition
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- crypto: qat - Fix incorrect uses of memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- [PATCH v7 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Remove unnecessary KERN_ERR in bfin_crc.c
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: amcc: crypto4xx_sa.c: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Vinson Lee <vlee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG: zeroize key data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 2/4] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: AF_ALG: zeroize key data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] hwrng: core - Drop current rng in set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] hwrng: core - Move hwrng_init call into set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [0/5] hwrng: Fix kref warning and underlying bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: ablkcipher - fixed style errors in ablkcipher.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg: fix backlog handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] MIPS: OCTEON: crypto: add instruction definitions for MD5
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 1/5] MIPS: OCTEON: add crypto helper functions
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 5/5] crypto: enable OCTEON MD5 module selection
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 4/5] MIPS: OCTEON: crypto: add MD5 module
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 3/5] MIPS: OCTEON: reintroduce crypto features check
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: af_alg: fix backlog handling
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [QUESTION] How is the backlog supposed to be used?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: ux500: fix checkpatch errors
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Fix assumption that sg in and out will have the same nents
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v5 REPOST 4/6] hw_random: fix unregister race.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 1/6] hw_random: place mutex around read functions and buffers.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 5/6] hw_random: don't double-check old_rng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 3/6] hw_random: use reference counts on each struct hwrng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 2/6] hw_random: move some code out mutex_lock for avoiding underlying deadlock
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 6/6] hw_random: don't init list element we're about to add to list.
- From: Amos Kong <akong@xxxxxxxxxx>
- Re: [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v5 6/8] crypto: AF_ALG: zeroize key / seed data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 4/8] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 24/25] crypto: ansi_cprng - Introduce non-deterministic mode
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 11/25] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 16/25] crypto: testmgr - Report failure on zero-length crypto_rng_get_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 21/25] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 15/25] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 22/25] crypto: ansi_cprng - Tweak comments
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 23/25] crypto: ansi_cprng - Introduce a "union cipherblock"
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 20/25] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 19/25] crypto: ansi_cprng - simplify get_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 14/25] crypto: tcrypt - Add const qualifiers all over the test code.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 12/25] crypto: ansi_cprng - Get rid of rdata buffer in fips_cprng_reset
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 09/25] crypto: ansi_cprng - Make length types consistent
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 18/25] crypto: testmgr - Add CPRNG stutter test.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 17/25] crypto: testmgr - Don't crash if CPRNG test result is large
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 10/25] crypto: ansi_cprng - Use u8 data types consistently internally
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 06/25] crypto: ansi_cprng - Make cont_test a bool
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 08/25] crypto: ansi_cprng - Don't call reset_prng_context from cprng_init
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 07/25] crypto: ansi_cprng - Shrink context some more
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 03/25] crypto: ansi_cprng - Use %phN rather than print_hex_dump for debug
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 04/25] crypto: ansi_cprng - Make debug output more like NIST test vectors
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 02/25] crypto: ansi_cprng - Additional _get_more_prng_bytes cleanup
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 01/25] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: George Spelvin <linux@xxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in ahash.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in af_alg.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in aead.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style erro in algapi.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in ahash.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in af_alg.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in aead.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: tcrypt - Allow speed testing of arbitrary hash functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 0/5] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 5/5] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- re: crypto: qat - Intel(R) QAT transport code
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 17/17] crypto: ansi_cprng - Shrink default seed size
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 16/17] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 15/17] crypto: testmgr - Teach test_cprng to handle non-default seed sizes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 14/17] crypto: ansi_cprng - If DT is omitted, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 12/17] crypto: ansi_cprng - Create a "block buffer" data type
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 10/17] crypto: ansi_cprng - simplify get_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 09/17] crypto: ansi_cprng - Clean up some variable types
- From: "George Spelvin" <linux@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]