Linux Crypto
[Prev Page][Next Page]
- [PATCH 08/17] crypto: ansi_cprng - Require non-null key & V in reset_prng_context
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 06/17] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 05/17] crypto: ansi_cprng - Add const annotations to hexdump()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- PATCH 04/17] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - removed unneeded code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [QUESTION] How is the backlog supposed to be used?
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] crypto: sahara - replace tasklets with kthread
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: sahara - fix spinlock initialization
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 2/4] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - removed unneeded code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: algif_skcipher - Fixed blocking recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- crypto: algif_skcipher - Fixed blocking recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3] crypto: include crypto- module prefix in template
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - add MODULE_ALIAS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: user - add MODULE_ALIAS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [patch] crypto: sha-mb - remove a bogus NULL check
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/9] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/7] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/7] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH RESEND v2 2/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 4/4] ARM: at91/dt: add trng node to at91sam9g45
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- RE: [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH RESEND 4/4] ARM: at91/dt: add trng node
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 2/4] hwrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] crypto: Fix a typo in ahash.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH V2 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- RE: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: Fix a typo in ahash.c
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 2/2] kernel/kexec: free crypto_shash using crypto_free_shash
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Documentation - document uncovered member variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/10] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/10] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/10] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/10] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/10] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/10] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/10] crypto: AF_ALG: user space interface for hash info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: qat - Use memzero_explicit
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Documentation - document uncovered member variables
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: zeroization of buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Luis Henriques <luis.henriques@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/8] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/8] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/8] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 6/8] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- [PATCH v3 12/13] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 11/13] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 09/13] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 08/13] crypto: Documentation - cipher data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 07/13] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 06/13] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 05/13] crypto: Documentation - hash data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 04/13] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 03/13] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 01/13] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 02/13] crypto: Documentation - compile crypto API spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 10/13] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 13/13] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [QUESTION] Crypto queue handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: Asynchronous usage of PCOMPRESS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: zeroization of buffers
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: AF_ALG - zeroize IV buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Asynchronous usage of PCOMPRESS
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher: check for IV size superfluous?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Crypto Fixes for 3.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- libkcapi: First release of kernel crypto API userspace library
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- crypto: algif_skcipher: check for IV size superfluous?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- [PATCH RFC 3/4] crypto: qat - Add userspace instances
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 1/4] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 0/4] crypto: qat - Add userspace access to QAT services
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 2/4] crypto: qat - Add PKE firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] NX crypto driver fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500/hash: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH v2] arm64/crypto: use crypto instructions to generate AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Steve Capper <steve.capper@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/11] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/11] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/11] crypto: Documentation - documentation of crypto_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/11] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/11] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/11] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 11/11] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] crypto: caam - add support for rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 8/9] Fixing the limit number of bytes to be processed
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/9] Fix SHA concurrence issue and sg limit bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/9] Moving NX-AES-XCBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/9] Moving NX-AES-GCM to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/9] Moving NX-AES-ECB to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] Moving limit and bound logic in CTR and fix IV vector
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/9] Moving NX-AES-CCM to be processed logic and sg_list bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/9] Moving NX-AES-CBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/9] NX crypto driver fixes
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup unnecessary break checkpatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup coccicheck warning - NULL check before freeing functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: fix bad unlock balance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use crypto_inc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 0/3] crypto: sahara - SHA1/256 support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] crypto: sahara - initialize spinlock
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] caam: caamalg - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Crestez Dan Leonard <cdleonard@xxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v3 01/59] crypto: ux500: Use dmaengine_terminate_all API
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Valentin Rothberg <valentinrothberg@xxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [linux-sunxi] [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: Koen Kooi <koen@xxxxxxxxxxxxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/4] ARM: sun7i: dt: Add Security System to A20 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 3/4] MAINTAINERS: Add myself as maintainer of Allwinner Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: randconfig build error with next-20141015, in crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev PATCH] qat: cleanup coccicheck warning - NULL check before freeing functions
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [cryptodev PATCH] qat: cleanup unnecessary break checkpatch warning
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [cryptodev PATCH] qat: fix bad unlock balance
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: drbg - use crypto_inc
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [GIT PULL] LLVMLinux patches for v3.18
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - Prevent dma mapping zero length assoc data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Michael Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Michael Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Mike Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- RE: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: "tudor.ambarus@xxxxxxxxxxxxx" <tudor.ambarus@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: "tudor.ambarus@xxxxxxxxxxxxx" <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 1/2] crypto: qat - Prevent dma mapping zero length assoc data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto, qat, use generic numa functions
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH] crypto, qat, use generic numa functions
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] crypto, qat, use generic numa functions
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Crypto Update for 3.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- [PATCH v2 0/2] crypto: sahara - SHA1/256 support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Mike Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: aesni - fix and re-enable "by8" CTR variant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 3/3] Revert "crypto: aesni - disable "by8" AVX CTR optimization"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: aesni - remove unused defines in "by8" variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: aesni - fix counter overflow handling in "by8" variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: aesni - fix and re-enable "by8" CTR variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: chandramouli narayanan <mouli@xxxxxxxxxxxxxxx>
- Crypto Fixes for 3.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v4 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- [PATCH v4 00/12] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 05/12] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 06/12] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 07/12] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 03/12] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 08/12] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 04/12] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 09/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 12/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 10/12] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- tcrypt rfc4309 ccm test keys size issue
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Romain Francoise <romain@xxxxxxxxxxxxx>
- Re: RFC possible changes for Linux random device
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- RFC possible changes for Linux random device
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 3.13 056/187] crypto: ux500 - make interrupt mode plausible
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [3.13.y.z extended stable] Patch "crypto: ux500 - make interrupt mode plausible" has been added to staging queue
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- Re: [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: qat: Qat driver fixes.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Romain Francoise <romain@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Michał Mirosław <mirqus@xxxxxxxxx>
- RE: [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: "NiteshNarayanLal@xxxxxxxxxxxxx" <NiteshNarayanLal@xxxxxxxxxxxxx>
- [PATCH v3 00/12] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 03/12] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 06/12] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 04/12] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 07/12] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 09/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 10/12] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 12/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 08/12] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 05/12] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: qat: Fix typo in name of tasklet_struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/3] crypto: qat: Removed unneeded partial state
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: qat: Enable all 32 IRQs
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: qat: Qat driver fixes.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: slab kmalloc guard patch uncovers potential issue with crypto, triggered by cryptomgr_test
- From: Matt <jackdachef@xxxxxxxxx>
- [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Scot Doyle <lkml14@xxxxxxxxxxxxx>
- [PATCH v2] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v2] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: AF_ALG inadvertently disabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- AF_ALG inadvertently disabled
- From: Scot Doyle <lkml14@xxxxxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 3.10 27/55] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.14 38/88] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.16 054/125] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [patch added to the 3.12 stable tree] crypto: ux500 - make interrupt mode plausible
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH 3.12 42/56] crypto: ux500 - make interrupt mode plausible
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH RFC 1/6] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 2/6] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 3/6] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 6/6] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 4/6] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: Nitesh Narayan Lal <b44382@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: mv_cesa.h: Add missing #define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: lz4,lz4hc - fix decompression
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
- From: Alexander Gordeev <agordeev@xxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] DRBG: fix sparse warning for cpu_to_be[32|64]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] DRBG: fix sparse warning for cpu_to_be[32|64]
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Linux-crypto: Do we have AES-CBC implementation using Intel SSSE3?
- From: Shuai Xiao <shuai.xiao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: SHA1 multibuffer implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] DRBG: efficiency patches
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix return value check in adf_chr_drv_create()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: caamhash.c fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] CAAM RNG4 fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: remove unused function argument
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: white space fix-ups on test_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] crypto: tcrypt: new user interface with debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/crypto: remove redundant update of data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64/crypto: remove redundant update of data
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] drivers: crypto: mv_cesa.h: Add missing #define
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: lz4,lz4hc - fix decompression
- From: KOVACS Krisztian <hidden@xxxxxxxxxx>
- [PATCH 2/2] crypto: testmgr - add test for lz4 and lz4hc
- From: KOVACS Krisztian <hidden@xxxxxxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Milan Broz <gmazyland@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]