Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: David Miller <davem@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: remove unnecessary includes
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unnecessary includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Harald Freudenberger <hfreude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Richard Weinberger <richard@xxxxxx>
- RE: [PATCH] crypto: remove unnecessary includes
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unnecessary includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] padata: Fix wrong usage of rcu_dereference()
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: pcrypt - Fix wrong usage of rcu_dereference()
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/2] pcrypt/padata rcu fixes
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: AF_ALG: Check for MSG_SENDPAGE_NOTLAST
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH] crypto: remove unnecessary includes
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Harald Freudenberger <hfreude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: ccm - Fix handling of zero plaintext when computing mac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s390 - Fix aes-xts parameter corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - corrrectly handle zero-length assoc data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] crypto: scatterwalk - Set the chain pointer indication bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: authenc - Find proper IV address in ablkcipher callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix potential NULL pointer dereference in skcipher_alloc_sgl()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: testmgr - fix sglen in test_aead for case 'dst != src'
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: talitos - fix aead sglen for case 'dst != src'
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam - fix aead sglen for case 'dst != src'
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccm - Fix handling of zero plaintext when computing mac
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- Re: [vireshk:cpufreq-next 20/36] ERROR: "crc32_le" [fs/ubifs/ubifs.ko] undefined!
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v3] crypto: more robust crypto_memneq
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH v3] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: more robust crypto_memneq
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - Add missing Job Ring include
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Yuanhan Liu <yuanhan.liu@xxxxxxxxxxxxxxx>
- RE: [PATCH] crypto/caam/jr.c: include linux/of_address.h
- From: Shaohui Xie <Shaohui.Xie@xxxxxxxxxxxxx>
- RE: [PATCH] crypto/caam/jr.c: include linux/of_address.h
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: caam - Add missing Job Ring include
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- [PATCH] crypto/caam/jr.c: include linux/of_address.h
- From: <shh.xie@xxxxxxxxx>
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Shawn Landden <shawn@xxxxxxxxxxxxxxx>
- Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH v3] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: more robust crypto_memneq
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- [PATCH v2] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: more robust crypto_memneq
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: more robust crypto_memneq
- From: James Yonan <james@xxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Richard Weinberger <richard@xxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Yuanhan Liu <yuanhan.liu@xxxxxxxxxxxxxxx>
- Re: WARNING: CPU: 0 PID: 1 at init/main.c:711 do_one_initcall()
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Shawn Landden <shawn@xxxxxxxxxxxxxxx>
- Re: [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [PATCH] update consumers of MSG_MORE to recognize MSG_SENDPAGE_NOTLAST
- From: Shawn Landden <shawn@xxxxxxxxxxxxxxx>
- [PATCH] Commit 35f9c09fe (tcp: tcp_sendpages() should call tcp_push() once) added an internal flag MSG_SENDPAGE_NOTLAST, similar to MSG_MORE.
- From: Shawn Landden <shawn@xxxxxxxxxxxxxxx>
- Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Shawn Landden <shawnlandden@xxxxxxxxx>
- Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Shawn Landden <shawn@xxxxxxxxxxxxxxx>
- [PATCH] pipe_to_sendpage: Ensure that MSG_MORE is set if we set MSG_SENDPAGE_NOTLAST
- From: Richard Weinberger <richard@xxxxxx>
- Re: AF_ALG buggy with sendfile
- From: Shawn Landden <shawnlandden@xxxxxxxxx>
- Re: AF_ALG buggy with sendfile
- From: Shawn Landden <shawnlandden@xxxxxxxxx>
- [PATCH] crypto: more robust crypto_memneq
- From: Cesar Eduardo Barros <cesarb@xxxxxxxxxxxxx>
- AF_ALG buggy with sendfile
- From: Shawn Landden <shawnlandden@xxxxxxxxx>
- v3.13-rc1: "‘system_trusted_keyring’ undeclared" caused by commit 09fbc47373826 ("KEYS: verify a certificate is signed by a 'trusted' key")
- From: Bjørn Mork <bjorn@xxxxxxx>
- Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxx>
- Re: [PATCH] crypto: s390 - Fix aes-xts parameter corruption
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxx>
- Re: [PATCH 00/10] AMD Cryptographic Coprocessor support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] AMD Cryptographic Coprocessor support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/7] crypto: at91/atmel: add Device Tree support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/7] crypto: at91/atmel: add Device Tree support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] crypto: s390 - Fix aes-xts parameter corruption
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxx>
- [PATCH] crypto: talitos - corrrectly handle zero-length assoc data
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH] s390/crypto: fix aes ctr concurrency issue
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: caam - Add missing Job Ring include
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- [GIT] Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - Add missing Job Ring include
- From: Michael Neuling <mikey@xxxxxxxxxxx>
- Re: crypto: s390 - Fix aes-cbc IV corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [RFC 08/23] crypto: omap-aes - raw read and write endian fix
- From: Taras Kondratiuk <taras.kondratiuk@xxxxxxxxxx>
- [RFC 09/23] crypto: omap-sham - raw read and write endian fix
- From: Taras Kondratiuk <taras.kondratiuk@xxxxxxxxxx>
- Re: [PATCH 16/51] DMA-API: ppc: vio.c: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Cedric Le Goater <clg@xxxxxxxxxx>
- [PATCH] crypto: fix potential NULL pointer dereference in skcipher_alloc_sgl()
- From: Jeff Liu <jeff.liu@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: s390 - Fix aes-cbc IV corruption
- From: Jan Glauber <jan.glauber@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- [PATCH] crypto: talitos - fix locating offending descriptor in error path
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: Executing time variation tests on bare metal
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Error inserting sha256_ssse3: No such device
- From: Turbo Fredriksson <turbo@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Error inserting sha256_ssse3: No such device
- From: Turbo Fredriksson <turbo@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: testmgr - make test_aead also test 'dst != src' code paths
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH] crypto: omap-sham - Only release DMA channel if successfully requested
- From: "Mark A. Greer" <mgreer@xxxxxxxxxxxxxxx>
- Re: Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/10] AMD Cryptographic Coprocessor support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 01/10] crypto: authenc - Find proper IV address in ablkcipher callback
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 02/10] crypto: scatterwalk - Set the chain pointer indication bit
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 03/10] crypto: CCP device driver and interface support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 04/10] crypto: crypto API interface to the CCP device driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 06/10] crypto: CCP AES CMAC mode crypto API support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 07/10] crypto: CCP XTS-AES crypto API support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 09/10] crytpo: CCP device driver build files
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 10/10] crypto: CCP maintainer information
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 08/10] crypto: CCP SHA crypto API support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 05/10] crypto: CCP AES crypto API support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Crypto Update for 3.13
- From: Borislav Petkov <bp@xxxxxxxxx>
- Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: testmgr - make test_aead also test 'dst != src' code paths
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] powerpc: add explicit OF includes for ppc4xx
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH RESEND] crypto: make sure *blkcipher_walk_init properly initialises walk
- From: Michal Nazarewicz <mina86@xxxxxxxxxx>
- [PATCH] powerpc: add explicit OF includes for ppc4xx
- From: Rob Herring <robherring2@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH RESEND] crypto: make sure *blkcipher_walk_init properly initialises walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH RESEND] crypto: make sure *blkcipher_walk_init properly initialises walk
- From: Michal Nazarewicz <mpn@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Clemens Ladisch <clemens@xxxxxxxxxx>
- [PATCH] CRYPTO: async_tx: Fixed a couple of typos
- From: Mickael Maison <mickael.maison@xxxxxxxxx>
- [PATCH RESEND 7/7] crypto: atmel-sha - add sha information to the log
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 6/7] crypto: atmel-sha - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 5/7] crypto: atmel-tdes - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 4/7] crypto: atmel-aes - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 3/7] ARM: at91/dt/sama5d3: add DMA information to SHA/AES/TDES nodes
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 2/7] ARM: at91/dt/trivial: before sama5d3, Atmel MPU were using at91 prefix
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 1/7] ARM: at91/dt/trivial: use macro for AES irq type
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND 0/7] crypto: at91/atmel: add Device Tree support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Crypto Update for 3.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Nicholas Mc Guire <der.herr@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Nicholas Mc Guire <der.herr@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RESEND 2][PATCH] hwrng: add randomness to system from rng sources
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 1/4] random: use device attach events for entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/4] random: use device attach events for entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/4] random: use device attach events for entropy
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH 2/4] random: make add_timer_randomness() fill the nonblocking pool first
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 1/4] random: use device attach events for entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 0/4] random: improve entropy pool initialization at boot time
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 4/4] random: don't zap entropy count in rand_initialize()
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 3/4] random: printk notifications for urandom pool initialization
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Pavel Machek <pavel@xxxxxx>
- Re: linux-next: Tree for Oct 31 (crypto, rsa, mpi)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Oct 31 (crypto, rsa, mpi)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: linux-next: Tree for Oct 31 (crypto, rsa, mpi)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH -next] crypto: padlock: Remove #define PFX, use pr_<level>
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Mauro Carvalho Chehab <m.chehab@xxxxxxxxxxx>
- Re: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- crypto: s390 - Fix aes-cbc IV corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: Joel Fernandes <joelf@xxxxxx>
- RE: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: "Fernandes, Joel" <joelf@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] crypto: omap-aes: Fix CTR mode counter length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] CRYPTO: omap-sham: Add missing modalias
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] padata: make the sequence counter an atomic_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: caam - Add Platform driver for Job Ring
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [RFC] Unaligned CTR mode tests in crypto/testmgr.h
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH] crypto: omap-aes: Fix CTR mode counter length
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] CRYPTO: omap-sham: Add missing modalias
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- Re: crypto: skcipher - Use eseqiv even on UP machines
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: blkcipher: do not read unutialised walk->flags
- From: Michal Nazarewicz <mpn@xxxxxxxxxx>
- [PATCH RESEND] padata: make the sequence counter an atomic_t
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- Re: [PATCH] padata: make the sequence counter an atomic_t
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- Re: [PATCH] padata: make the sequence counter an atomic_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: make the sequence counter an atomic_t
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- Re: crypto: skcipher - Use eseqiv even on UP machines
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 3/3] crypto: caam - Modify the interface layers to use JR API's
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: caam - Add API's to allocate/free Job Rings
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: caam - Add Platform driver for Job Ring
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- crypto: skcipher - Use eseqiv even on UP machines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Oct 22 (crypto/asymmetric_keys/rsa.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: Geyslan Gregório Bem <geyslan@xxxxxxxxx>
- Re: [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: Geyslan Gregório Bem <geyslan@xxxxxxxxx>
- Re: [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: n2_core: insert '!err' condition in else scope
- From: "Geyslan G. Bem" <geyslan@xxxxxxxxx>
- Re: [PATCH] [CRYPTO] kconfig: Corrected a typo
- From: Jiri Kosina <jkosina@xxxxxxx>
- [PATCH] [CRYPTO] kconfig: Corrected a typo
- From: Siddharth Goel <siddharth98391@xxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: "Rafael J. Wysocki" <rjw@xxxxxxx>
- testmgr: async hashes : _update and _final tests
- From: Jiten Lulla <lullajd@xxxxxxxxxxx>
- Re: [PATCH 0/5] Authenc key parsing consolidation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mv_cesa: remove deprecated IRQF_DISABLED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: atmel-sha - add sha information to the log
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH 2/3] crypto: atmel-sha - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH 1/3] crypto: atmel-tdes - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH 5/5] crypto: talitos - Simplify key parsing
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH 4/5] crypto: picoxcell - Simplify and harden key parsing
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH 1/5] crypto: authenc - Export key parsing helper function
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH 3/5] crypto: ixp4xx - Simplify and harden key parsing
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH 2/5] crypto: authencesn - Simplify key parsing
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH 0/5] Authenc key parsing consolidation
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: at91/dt/trivial: before sama5d3, Atmel MPU were using at91 prefix
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH 2/3] ARM: at91/dt/trivial: before sama5d3, Atmel MPU were using at91 prefix
- From: Jean-Christophe PLAGNIOL-VILLARD <plagnioj@xxxxxxxxxxxx>
- [PATCH 3/3] ARM: at91/dt/sama5d3: add DMA information to SHA/AES/TDES nodes
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH 2/3] ARM: at91/dt/trivial: before sama5d3, Atmel MPU were using at91 prefix
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH 1/3] ARM: at91/dt/trivial: use macro for AES irq type
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] crypto: atmel-aes - add support for Device Tree
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] crypto: mv_cesa: remove deprecated IRQF_DISABLED
- From: Michael Opdenacker <michael.opdenacker@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: initcall calibrate_xor_blocks returned with preemption imbalance
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Scatterwalk / scatterlist compatibility
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: initcall calibrate_xor_blocks returned with preemption imbalance
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: initcall calibrate_xor_blocks returned with preemption imbalance
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- Re: [PATCH] padata: make the sequence counter an atomic_t
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: "Christoph G. Baumann" <cb@xxxxxxx>
- Re: [PATCH] sha256_ssse3: also test for BMI2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara: Remove redundant of_match_ptr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: dcp: Check the return value from devm_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Will Deacon <will.deacon@xxxxxxx>
- randconfig build error with next-20131003, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: [PATCH v2 3/3] ARM: add support for bit sliced AES using NEON instructions
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- [PATCH v2 3/3] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] ARM: move AES typedefs and function prototypes to separate header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] ARM: pull in <asm/simd.h> from asm-generic
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Status of "kernel crypto services" patch? Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Correct RSA MPI dependency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: crypto: GCM API usage
- From: tobias.polzer@xxxxxx
- Re: randconfig build error with next-20131002, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: randconfig build error with next-20131002, in crypto
- From: Borislav Petkov <bp@xxxxxxxxx>
- randconfig build error with next-20131002, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Status of "kernel crypto services" patch? Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] Crypto: change all occurances of "kerneli" to kernel Bug #60848
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- [PATCH] Crypto: change all occurances of "kerneli" to kernel Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- [PATCH] padata: make the sequence counter an atomic_t
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH] sha256_ssse3: also test for BMI2
- Re: [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Hans Verkuil <hverkuil@xxxxxxxxx>
- [PATCH 2/2] crypto: mv_cesa: Remove redundant of_match_ptr
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/2] crypto: sahara: Remove redundant of_match_ptr
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Getting started with crypto drivers
- From: Emilio López <emilio@xxxxxxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Tobias Rauter <tobiasrauter@xxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 00/51] DMA mask changes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 31/51] DMA-API: media: omap3isp: use dma_coerce_mask_and_coherent()
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/51] DMA mask changes
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
- From: James Yonan <james@xxxxxxxxxxx>
- Re: IV generation in geode-aes
- From: Hamid Nassiby <h.nassiby@xxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Veli-Pekka Peltola <veli-pekka.peltola@xxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Michal Marek <mmarek@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 1/3] crypto: Fully restore ahash request before completing
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Archit Taneja <archit@xxxxxx>
- IV generation in geode-aes
- From: Sohail <sohailtariq25@xxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] crypto: caam - map src buffer before access
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH] crypto: dcp: Check the return value from devm_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: dcp - Use devm_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: move ablk_helper out of arch/x86
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ansi_cprng: Fix off by one error in non-block size request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: tegra: remove tegra_chip_uid()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tegra-aes - Fix NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - map src buffer before access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mv_cesa - Staticize local symbols
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: caam - map src buffer before access
- From: Kim Phillips <kim.phillips@xxxxxxxxxx>
- Re: [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Phil Carmody <phil.carmody@xxxxxxxxxxxxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 37/51] DMA-API: usb: use new dma_coerce_mask_and_coherent()
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Asymmetric cryptography HW offloading
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [alsa-devel] [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 23/51] DMA-API: dma: pl08x: add dma_set_mask_and_coherent() call
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] crypto: dcp: Fix the path for releasing the resources
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/3] crypto: dcp: Use devm_request_irq()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/3] crypto: dcp: Use devm_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 22/51] DMA-API: amba: get rid of separate dma_mask
- From: Grant Likely <grant.likely@xxxxxxxxxx>
- Re: [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 0/4] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] ARM: move AES typedefs and function prototypes to separate header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] ARM: pull in <asm/simd.h> from asm-generic
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3] crypto: caam - map src buffer before access
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Felipe Balbi <balbi@xxxxxx>
- [PATCH 16/51] DMA-API: ppc: vio.c: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 23/51] DMA-API: dma: pl08x: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Felipe Balbi <balbi@xxxxxx>
- [PATCH 09/51] DMA-API: net: broadcom/b44: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 38/51] DMA-API: staging: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 37/51] DMA-API: usb: use new dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 34/51] DMA-API: net: octeon: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 33/51] DMA-API: net: nxp/lpc_eth: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 32/51] DMA-API: mmc: sdhci-acpi: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 14/51] DMA-API: net: b43: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH 31/51] DMA-API: media: omap3isp: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 30/51] DMA-API: dma: dw_dmac.c: convert to use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 29/51] DMA-API: ata: pata_octeon_cf: convert to use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 28/51] DMA-API: sound: fix dma mask handling in a lot of drivers
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 26/51] DMA-API: usb: ohci-sa1111: add a note about DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 27/51] DMA-API: provide a helper to setup DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 21/51] DMA-API: usb: ssb-hcd: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 25/51] DMA-API: video: clcd: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 20/51] DMA-API: usb: bcma: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 15/51] DMA-API: net: b43legacy: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 10/51] DMA-API: net: broadcom/bnx2x: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 12/51] DMA-API: net: intel/e1000: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 18/51] DMA-API: staging: et131x: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 13/51] DMA-API: net: sfc/efx.c: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 11/51] DMA-API: net: emulex/benet: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 22/51] DMA-API: amba: get rid of separate dma_mask
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 46/51] ARM: DMA-API: better handing of DMA masks for coherent allocations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 45/51] DMA-API: firmware/google/gsmi.c: avoid direct access to DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 47/51] ARM: 7794/1: block: Rename parameter dma_mask to max_addr for blk_queue_bounce_limit()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 48/51] ARM: 7795/1: mm: dma-mapping: Add dma_max_pfn(dev) helper function
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 49/51] ARM: 7796/1: scsi: Use dma_max_pfn(dev) helper for bounce_limit calculations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 51/51] ARM: 7805/1: mm: change max*pfn to include the physical offset of memory
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: move x86 to the generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 40/51] DMA-API: crypto: fix ixp4xx crypto platform device support
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 41/51] DMA-API: crypto: remove last references to 'static struct device *dev'
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 44/51] DMA-API: dcdbas: update DMA mask handing
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 50/51] ARM: 7797/1: mmc: Use dma_max_pfn(dev) helper for bounce_limit calculations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 35/51] DMA-API: parport: parport_pc.c: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Ben Hutchings <bhutchings@xxxxxxxxxxxxxx>
- [PATCH 17/51] DMA-API: block: nvme-core: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 08/51] DMA-API: net: intel/ixgbevf: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 06/51] DMA-API: net: intel/ixgb: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 07/51] DMA-API: net: intel/ixgbe: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 05/51] DMA-API: net: intel/igbvf: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 04/51] DMA-API: net: intel/igb: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 03/51] DMA-API: net: intel/e1000e: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 02/51] DMA-API: net: brocade/bna/bnad.c: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 00/51] DMA mask changes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - map src buffer before access
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH] ansi_cprng: Fix off by one error in non-block size request
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: move x86 to the generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Dominik Paulus <dominik@xxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] ARM: tegra: remove tegra_chip_uid()
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- crypto: GCM API usage
- From: dominik.d.paulus@xxxxxxxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: move ablk_helper out of arch/x86
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH 2/2] crypto: tegra-aes: Use devm_clk_get
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/2] crypto: tegra-aes: Fix NULL pointer dereference
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 05/15] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 09/15] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 11/15] Hibernate: taint kernel when signature check fail
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 12/15] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [RFC PATCH 1/2] crypto: move ablk_helper out of arch/x86
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/2] AES in CBC/CTR/XTS modes using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Crypto Fixes for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 3.12
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: caam - RNG4 patches and fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86: restore avx2_supported check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha256_ssse3 - use correct module alias for sha224
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: tegra-aes - Staticize tegra_aes_cra_exit
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 2/3] crypto: omap-aes - Staticize local symbols
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/3] crypto: mv_cesa - Staticize local symbols
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Crypto Fixes for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: question about rfc404 support.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Waiman Long <waiman.long@xxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- question about rfc404 support.
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- Re: sd_mod - uknown symbol crc_t10_diff [was Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied]
- From: Arthur Marsh <arthur.marsh@xxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto:caam:Map src buffer before access in CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] drivers/crypto:caam:Map src buffer before access in CAAM driver
- From: <Yashpal.Dutta@xxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- [PATCH 4/7] crypto: caam - split RNG4 instantiation function
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 7/7] crypto: caam - enable instantiation of all RNG4 state handles
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 6/7] crypto: caam - fix RNG4 AAI defines
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 3/7] crypto: caam - fix RNG4 instantiation
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 5/7] crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 2/7] crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 0/7] crypto: caam - RNG4 patches and fixes
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 1/7] crypto: caam - fix RNG state handle instantiation descriptor
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH][RFC] Tests on 200 different CPUs/Arches and OSes with CPU Jitter RNG (resent)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: James Yonan <james@xxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Crypto Update for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: x86: restore avx2_supported check
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH] crypto: sha256_ssse3 - use correct module alias for sha224
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Mistake ?
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Mistake ?
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- possible race in crypto_alg_mod_lookup
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix bitoperation for compilation with clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Series of fixes for NX driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Rajendra Nayak <rnayak@xxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 0/3] crypto: omap-des: Add driver for OMAP DES module
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 3/3] crypto: omap-des: Add triple DES (des3_ede) support to driver
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 2/3] crypto: omap-des: Add config and build options
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxxx>
- [PATCH] Fix bitoperation for compilation with clang
- [PATCH v2 00/10] Series of fixes for NX driver
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/10] crypto: nx - add offset to nx_build_sg_lists()
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 04/10] crypto: nx - fix limits to sg lists for AES-CTR
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/10] crypto: nx - fix limits to sg lists for AES-GCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 06/10] crypto: nx - fix limits to sg lists for AES-XCBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 07/10] crypto: nx - fix limits to sg lists for AES-CCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: nx - fix SHA-2 for chunks bigger than block size
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 09/10] crypto: nx - fix GCM for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/10] crypto: nx - fix XCBC for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/10] crypto: nx - fix limits to sg lists for AES-ECB
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Manfred Hollstein <mhollstein@xxxxxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Announce loop-AES-v3.7a file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 08/18] Secure boot: Add new capability
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH 01/10] crypto: nx - add offset to nx_build_sg_lists()
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 00/10] Series of fixes for NX driver
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/10] crypto: nx - fix limits to sg lists for AES-ECB
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] crypto: nx - fix limits to sg lists for AES-CTR
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/10] crypto: nx - fix limits to sg lists for AES-XCBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] crypto: nx - fix limits to sg lists for AES-CCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/10] crypto: nx - fix XCBC for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 09/10] crypto: nx - fix GCM for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/10] crypto: nx - fix SHA-2 for chunks bigger than block size
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/10] crypto: nx - fix limits to sg lists for AES-GCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 04/18] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 05/18] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 08/18] Secure boot: Add new capability
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 16/18] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Jan-Simon Möller <dl9pf@xxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]