Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: omap: Free memory in error path
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] crypto: omap: Free memory in error path
- From: Christophe Jaillet <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH repost] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam: pair irq map and dispose in the same function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam: remove dead code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: replace scatterwalk_sg_next with sg_next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Free memory in error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v1 2/3] SHA256 for PPC/SPE - glue
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 3/3] SHA256 for PPC/SPE - kernel config
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 1/3] SHA256 for PPC/SPE - assembler
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- [PATCH v1 0/3] SHA256 for PPC/SPE
- From: Markus Stockhausen <stockhausen@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto/testmgr: mark rfc4106(gcm(aes)) as fips_allowed
- From: Stephan Mueller <smueller@xxxxxxxxx>
- [PATCH] crypto/testmgr: mark rfc4106(gcm(aes)) as fips_allowed
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: caam: fix resource clean-up on error path for caam_jr_init
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: pair irq map and dispose in the same function
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp: terminate ccp_support array with empty element
- From: Andrey Ryabinin <a.ryabinin@xxxxxxxxxxx>
- [PATCH 2/2] crypto: caam: remove unused local variable
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: remove dead code
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v11 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Documentation: remove colons in comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - don't emit ICV check failures to dmesg
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH repost] virtio_rng: drop extra empty line
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] crypto: replace scatterwalk_sg_next with sg_next
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel: Free memory in error path
- From: Christophe Jaillet <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Documentation: remove colons in comments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: notify expected failures on aead tests
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: aesni: add setkey for driver-gcm-aes-aesni
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Documentation: remove colons in comments
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Intel GCM: __driver-gcm-aes-aesni setkey missing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: seqiv - Ensure that IV size is at least 8 bytes
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: crypto: cts - Remove bogus use of seqiv
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- crypto: seqiv - Ensure that IV size is at least 8 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: cts - Weed out non-CBC algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio_rng: drop extra empty line
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- crypto: cts - Remove bogus use of seqiv
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - don't need qat_auth_state struct
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - don't need qat_auth_state struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v10 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v10 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH -next] crypto: algif_rng - fix sparse non static symbol warning
- Re: crypto: qat - Ensure ipad and opad are zeroed
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- crypto: qat - Ensure ipad and opad are zeroed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algif - change algif_skcipher to be asynchronous
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Fix for qat_aes_cbc_hmac_sha512
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- RE: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: "McCaffrey, Timothy M" <Timothy.McCaffrey@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 1/6] crypto: add missing crypto module aliases
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: qat - fix device reset flow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: module alias fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: don't use interruptible wait in tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- RE: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: "McCaffrey, Timothy M" <Timothy.McCaffrey@xxxxxxxxxx>
- Re: Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto: Add support for 192 & 256 bit keys to AESNI RFC4106 - resubmission
- From: Timothy McCaffrey <timcaffrey420@xxxxxxxxx>
- Re: [PATCH 5/6] crypto: sparc64/md5 - fix module description
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] crypto: sparc64/des - add "des3_ede" module alias
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sparc64/camellia - fix module alias
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: sparc64/aes - fix module description
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 6/6] crypto: x86/des3_ede - drop bogus module aliases
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: sparc64/md5 - fix module description
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: sparc64/aes - fix module description
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: sparc64/des - add "des3_ede" module alias
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: sparc64/camellia - fix module alias
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: add missing crypto module aliases
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: module alias fixes
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v9 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: qat - adf_ae_stop() is never called
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - remove unnecessary include of atomic.h header file
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - use pci_wait_for_pending_transaction()
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - correctly type a boolean
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: qat - fix device reset flow
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [PATCH] crypto: don't use interruptible wait in tests
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib: memzero_explicit: add comment for its usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: fix BUG_ON condition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v8 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v8 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] s390: crypto: aes_s390: Remove 'const' to avoid compiler warnings
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM aesni and 192/256-bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- [PATCH] lib: memzero_explicit: add comment for its usage
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: crypto: qat - Fix incorrect uses of memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM aesni and 192/256-bit keys
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - Fix incorrect uses of memzero_explicit
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: amcc: crypto4xx_sa.c: Remove unused function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_ERR in bfin_crc.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- GCM aesni and 192/256-bit keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: omap-des: fix BUG_ON condition
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- crypto: qat - Fix incorrect uses of memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- Re: [PATCH] Use memzero_explicit to clear local buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Use memzero_explicit to clear local buffers
- From: Giel van Schijndel <me@xxxxxxxxx>
- [PATCH v7 2/2] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 1/2] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v7 0/2] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Remove unnecessary KERN_ERR in bfin_crc.c
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- Re: [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: amcc: crypto4xx_sa.c: Remove unused function
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni - fix "by8" variant for 128 bit keys
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: AEAD: add check for presence of auth tag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: sha-mb - Add avx2_supported check.
- From: Vinson Lee <vlee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG: zeroize key data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 2/4] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 0/4] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 3/4] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 4/4] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Using separate initcall level for crypto subsystem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: AF_ALG: zeroize key data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/5] hwrng: core - Fix current_rng init/cleanup race yet again
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] hwrng: core - Drop current rng in set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] hwrng: core - Do not register device opportunistically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] hwrng: core - Move hwrng_init call into set_current_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] hwrng: core - Use struct completion for cleanup_done
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [0/5] hwrng: Fix kref warning and underlying bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Using separate initcall level for crypto subsystem
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: ablkcipher - fixed style errors in ablkcipher.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg: fix backlog handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] MIPS: OCTEON: crypto: add instruction definitions for MD5
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 1/5] MIPS: OCTEON: add crypto helper functions
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 5/5] crypto: enable OCTEON MD5 module selection
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 4/5] MIPS: OCTEON: crypto: add MD5 module
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 3/5] MIPS: OCTEON: reintroduce crypto features check
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- [PATCH 0/5] MIPS/crypto: MD5 for OCTEON
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: af_alg: fix backlog handling
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: leroy christophe <christophe.leroy@xxxxxx>
- Re: algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- algif_hash: splice of data > 2**16
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [QUESTION] How is the backlog supposed to be used?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Update for 3.19
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto: ux500: fix checkpatch errors
- From: Asaf Vertz <asaf.vertz@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - add support for cbc(aes) ablkcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Fix assumption that sg in and out will have the same nents
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v5 REPOST 4/6] hw_random: fix unregister race.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 0/6] fix hw_random stuck
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 1/6] hw_random: place mutex around read functions and buffers.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 5/6] hw_random: don't double-check old_rng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 3/6] hw_random: use reference counts on each struct hwrng.
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 2/6] hw_random: move some code out mutex_lock for avoiding underlying deadlock
- From: Amos Kong <akong@xxxxxxxxxx>
- [PATCH v5 REPOST 6/6] hw_random: don't init list element we're about to add to list.
- From: Amos Kong <akong@xxxxxxxxxx>
- Re: [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v5 6/8] crypto: AF_ALG: zeroize key / seed data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 2/8] crypto: AF_ALG: add setsockopt for auth tag size
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 3/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 4/8] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 5/8] crypto: AF_ALG: add user space interface for RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 24/25] crypto: ansi_cprng - Introduce non-deterministic mode
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 11/25] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 16/25] crypto: testmgr - Report failure on zero-length crypto_rng_get_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 25/25] crypto: ansi_cprng - If non-deterministic, don't buffer old output
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 21/25] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 15/25] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 22/25] crypto: ansi_cprng - Tweak comments
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 23/25] crypto: ansi_cprng - Introduce a "union cipherblock"
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 13/25] crypto: Add appropriate consts to RNG API
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 20/25] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 19/25] crypto: ansi_cprng - simplify get_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 14/25] crypto: tcrypt - Add const qualifiers all over the test code.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 12/25] crypto: ansi_cprng - Get rid of rdata buffer in fips_cprng_reset
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 09/25] crypto: ansi_cprng - Make length types consistent
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 18/25] crypto: testmgr - Add CPRNG stutter test.
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 17/25] crypto: testmgr - Don't crash if CPRNG test result is large
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 10/25] crypto: ansi_cprng - Use u8 data types consistently internally
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 05/25] crypto: ansi_cprng - Eliminate ctx->I and ctx->last_rand_data
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 06/25] crypto: ansi_cprng - Make cont_test a bool
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 08/25] crypto: ansi_cprng - Don't call reset_prng_context from cprng_init
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 07/25] crypto: ansi_cprng - Shrink context some more
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 03/25] crypto: ansi_cprng - Use %phN rather than print_hex_dump for debug
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 04/25] crypto: ansi_cprng - Make debug output more like NIST test vectors
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 02/25] crypto: ansi_cprng - Additional _get_more_prng_bytes cleanup
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 01/25] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: George Spelvin <linux@xxxxxxxxxxx>
- [PATCH v2 00/25] Multiple changes to crypto/ansi_cprng.c
- From: George Spelvin <linux@xxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RESEND][PATCH] crypto: drbg - panic on continuous self test error
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in ahash.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in af_alg.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style error in aead.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style erro in algapi.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in ahash.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in af_alg.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style error in aead.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- [PATCH] staging: crypto: fixed style errors in ablkcipher.c
- From: "Joshua I. James" <joshua@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Resend: [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- [PATCH] CRYPTO: atmel_sha: remove unused shash fallback instance
- From: Svenning Sørensen <sss@xxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: tcrypt - Allow speed testing of arbitrary hash functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v4 4/5] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: AF_ALG: enable AEAD interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/5] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 0/5] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 1/5] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 5/5] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: sahara - SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix problem with coalescing enable logic
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: crypto: qat - Intel(R) QAT transport code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- re: crypto: qat - Intel(R) QAT transport code
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 17/17] crypto: ansi_cprng - Shrink default seed size
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 16/17] crypto: testmgr - Merge seed arrays in struct cprng_testvec
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 15/17] crypto: testmgr - Teach test_cprng to handle non-default seed sizes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 14/17] crypto: ansi_cprng - If DT is omitted, don't buffer old output
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 13/17] crypto: ansi_cprng - If DT is not provided, use a fresh timestamp
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 12/17] crypto: ansi_cprng - Create a "block buffer" data type
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 11/17] crypto: ansi_cprng - unroll _get_more_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 10/17] crypto: ansi_cprng - simplify get_prng_bytes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 09/17] crypto: ansi_cprng - Clean up some variable types
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 08/17] crypto: ansi_cprng - Require non-null key & V in reset_prng_context
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 07/17] crypto: ansi_cprng - Shrink rand_read_pos & flags
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 06/17] crypto: ansi_cprng - Eliminate unused PRNG_FIXED_SIZE flag
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 05/17] crypto: ansi_cprng - Add const annotations to hexdump()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- PATCH 04/17] crypto: ansi_cprng - simplify xor_vectors() to xor_block()
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 03/17] crypto: ansi_cprng - Eliminate ctx->I
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 02/17] crypto: ansi_cprng - Eliminate ctx->last_rand_data
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 01/17] crypto: ansi_cprng - Rename rand_data_valid more sensibly
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 00/17] Multiple changes to crypto/ansi_cprng.c
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: algif - removed unneeded code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [QUESTION] How is the backlog supposed to be used?
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] crypto: sahara - replace tasklets with kthread
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: sahara - fix spinlock initialization
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 2/4] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: sahara - SHA support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8 v2] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8 v2] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 0/8] replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 3/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 6/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/8] sparc64: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/8] crypto: replace memset by memzero_explicit
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: algif_skcipher - initialize upon init request
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to implement X9.17/X9.31's RNG?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Is ansi_cprng.c supposed to be an implmentation of X9.31?
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - removed unneeded code
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: algif_skcipher - Fixed blocking recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- crypto: algif_skcipher - Fixed blocking recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3] crypto: include crypto- module prefix in template
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - add MODULE_ALIAS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: drbg - use MODULE_ALIAS_CRYPTO
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: user - add MODULE_ALIAS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: include crypto- module prefix in template
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: include crypto- module prefix in template
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [patch] crypto: sha-mb - remove a bogus NULL check
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: drbg: use memzero_explicit() for clearing sensitive data
- From: Nickolaus Woodruff <nickolauswoodruff@xxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [patch] crypto: sha-mb - remove a bogus NULL check
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: algif - Mark sgl end at the end of data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/9] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/7] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/7] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/7] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH RESEND v2 2/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 4/4] ARM: at91/dt: add trng node to at91sam9g45
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH RESEND v2 0/4] hwrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: user - Allow get request with empty driver name
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- crypto: user - Allow get request with empty driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] bfin_crc: don't include linux/unaligned/access_ok.h
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- RE: [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] arm64: crypto: Add ARM64 CRC32 hw accelerated module
- From: Yazen Ghannam <yazen.ghannam@xxxxxxxxxx>
- Re: [PATCH RESEND 0/4] hrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH crypto-next] crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH RESEND 4/4] ARM: at91/dt: add trng node
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 1/4] hwrng: atmel: use clk_prepapre_enable/_disable_unprepare
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 2/4] hwrng: atmel: add DT support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 3/4] hwrng: atmel: Add TRNG DT binding doc
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 0/4] ARM: at91: remove at91sam9g45/9m10 legacy board support
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] crypto: Fix a typo in ahash.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 1/1] crypto-drbg: Deletion of unnecessary checks before the function call "kzfree"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH V2 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH V2 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- RE: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2 v2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: Fix a typo in ahash.c
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] "its" == "something belong to it". "it's" == "it is", "it has", "it was", etc. Sorry - just bugged me as I was reading the code.
- From: Terence Eden <terence.eden@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 2/2] kernel/kexec: free crypto_shash using crypto_free_shash
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- [PATCH 1/2] scripts/coccinelle: catch freeing cryptographic structures via kfree
- From: Konstantin Khlebnikov <k.khlebnikov@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Documentation - document uncovered member variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: AF_ALG: document the user space interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/10] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/10] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/10] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/10] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/10] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/10] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/10] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/10] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/10] crypto: AF_ALG: user space interface for hash info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- [PATCH] crypto: prefix module autoloading with "crypto-"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: qat - Use memzero_explicit
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: simd: Allow simd use in kernel threads with softirqs disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- simd: Allow simd use in kernel threads with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Documentation - document uncovered member variables
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/16] crypto: caam - Remove unnecessary smp_read_barrier_depends()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- [RFC PATCH 00/16] Replace smp_read_barrier_depends() with lockless_derefrence()
- From: Pranith Kumar <bobby.prani@xxxxxxxxx>
- Re: [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: zeroization of buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Luis Henriques <luis.henriques@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 8/8] crypto: AF_ALG: enable RNG interface compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 7/8] crypto: AF_ALG: add random number generator support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/8] crypto: AF_ALG: add AEAD support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/8] crypto: AF_ALG: crypto API calls to inline functions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/8] crypto: AF_ALG: extend data structuers for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/8] crypto: AF_ALG: user space interface for cipher info
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/8] crypto: AF_ALG: add AEAD and RNG support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/8] crypto: AF_ALG: add user space interface for AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 6/8] crypto: AF_ALG: make setkey optional
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
- [PATCH v3 12/13] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 11/13] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 09/13] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 08/13] crypto: Documentation - cipher data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 07/13] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 06/13] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 05/13] crypto: Documentation - hash data structures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 04/13] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 03/13] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 00/13] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 01/13] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 02/13] crypto: Documentation - compile crypto API spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 10/13] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 13/13] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [QUESTION] Crypto queue handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Ming Liu <ming.liu@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]