Linux Crypto
[Prev Page][Next Page]
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: Asynchronous usage of PCOMPRESS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <James.Hartley@xxxxxxxxxx>
- [PATCH] crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH 1/2] crypto: AF_ALG - zeroize message digest buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: zeroization of buffers
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: AF_ALG - zeroize IV buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Asynchronous usage of PCOMPRESS
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: zeroization of sensitive data in af_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher: check for IV size superfluous?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: Add Imagination Technologies hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 2/2] Documentation: crypto: Add DT binding info for the img hw hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- [PATCH 0/2] crypto: Add support for the IMG hash accelerator
- From: James Hartley <james.hartley@xxxxxxxxxx>
- crypto: algif - avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Crypto Fixes for 3.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: zeroization of sensitive data in af_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- libkcapi: First release of kernel crypto API userspace library
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- crypto: algif_skcipher: check for IV size superfluous?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- [PATCH RFC 3/4] crypto: qat - Add userspace instances
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 4/4] crypto: qat - Add new algif interface for userspace
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 1/4] crytpo: qat - Fix 64 bytes requests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 0/4] crypto: qat - Add userspace access to QAT services
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RFC 2/4] crypto: qat - Add PKE firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] NX crypto driver fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500/hash: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- [PATCH] crypto: ux500/cryp: Silence compiler warning for !CONFIG_PM
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: "Joy M. Latten" <jmlatten@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: drbg - add MODULE_ALIAS for all DRBG types
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH v2] arm64/crypto: use crypto instructions to generate AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Steve Capper <steve.capper@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: Documentation - CIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 09/11] crypto: Documentation - BLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 08/11] crypto: Documentation - AEAD API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 06/11] crypto: Documentation - documentation of crypto_alg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 04/11] crypto: Documentation - AHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 02/11] crypto: Documentation - userspace interface spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 00/11] crypto: Documentation of kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 01/11] crypto: Documentation - crypto API high level spec
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 03/11] crypto: Documentation - RNG API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 05/11] crypto: Documentation - SHASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 07/11] crypto: Documentation - ABLKCIPHER API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 11/11] crypto: Documentation - HASH API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: caam: fix error reporting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix error reporting
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] crypto: caam - add support for rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - add support for ctr(aes)
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
- From: Catalin Vasile <catalin.vasile@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - add support for rfc4543(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: caam: fix missing dma unmap on error path
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 9/9] Disable ccm and ccm4309 in fips mod
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 8/9] Fixing the limit number of bytes to be processed
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/9] Fix SHA concurrence issue and sg limit bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/9] Moving NX-AES-XCBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/9] Moving NX-AES-GCM to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/9] Moving NX-AES-ECB to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] Moving limit and bound logic in CTR and fix IV vector
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/9] Moving NX-AES-CCM to be processed logic and sg_list bounds
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/9] Moving NX-AES-CBC to be processed logic
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/9] NX crypto driver fixes
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2] crypto: caam - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup unnecessary break checkpatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: cleanup coccicheck warning - NULL check before freeing functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev PATCH] qat: fix bad unlock balance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - use crypto_inc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 0/3] crypto: sahara - SHA1/256 support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] crypto: sahara - initialize spinlock
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH resending] splice: sendfile() at once fails for big files
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] caam: caamalg - fix output sequence contiguity check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC] tcp md5 use of alloc_percpu
- From: Crestez Dan Leonard <cdleonard@xxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v3 01/59] crypto: ux500: Use dmaengine_terminate_all API
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] arm64/crypto: use crypto instructions for generating AES key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev PATCH] qat: misspelling typo - "reseting" should be "resetting"
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Move BAR definitions to device specific module
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH] aesni-intel_glue.c: remove unnecessary #define
- From: Valentin Rothberg <valentinrothberg@xxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [linux-sunxi] [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: Koen Kooi <koen@xxxxxxxxxxxxxxxxxxxxx>
- Re: 3.17 regression; alg: skcipher: Chunk test 1 failed on encryption at page 0 for ecb-aes-padlock
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/4] ARM: sun7i: dt: Add Security System to A20 SoC DTS
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 2/4] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 4/4] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5 3/4] MAINTAINERS: Add myself as maintainer of Allwinner Security System
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v5] crypto: Add Allwinner Security System crypto accelerator
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: randconfig build error with next-20141015, in crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev PATCH] qat: cleanup coccicheck warning - NULL check before freeing functions
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [cryptodev PATCH] qat: cleanup unnecessary break checkpatch warning
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- [cryptodev PATCH] qat: fix bad unlock balance
- From: Bruce Allan <bruce.w.allan@xxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Nikolay Aleksandrov <nikolay@xxxxxxxxxx>
- Re: [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: drbg - use crypto_inc
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] kernel crypto API interface specification
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [GIT PULL] LLVMLinux patches for v3.18
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] crypto: qat - Enforce valid numa configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - Prevent dma mapping zero length assoc data
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Michael Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Michael Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Mike Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- RE: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: "tudor.ambarus@xxxxxxxxxxxxx" <tudor.ambarus@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: "tudor.ambarus@xxxxxxxxxxxxx" <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/2] crypto: caam - add support for gcm(aes)
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: caam - add support for rfc4106(gcm(aes))
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 1/2] crypto: qat - Prevent dma mapping zero length assoc data.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: qat - Enforce valid numa configuration.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] crypto: qat - Fix for invalid dma mapping and numa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto, qat, use generic numa functions
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Re: [PATCH] crypto, qat, use generic numa functions
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] crypto, qat, use generic numa functions
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- Crypto Update for 3.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: memset() in crypto code?
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH] crypto: Remove unnecessary KERN_INFO from testmgr.c
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- [PATCH v2 0/2] crypto: sahara - SHA1/256 support
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH] Crypto: gf128mul : fixed a parentheses coding style issue
- From: Mike Roocroft <mike.linux@xxxxxxxxxxxxxx>
- Re: memset() in crypto code?
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- memset() in crypto code?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: aesni - fix and re-enable "by8" CTR variant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: inconsistent handling of unaligned hash inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- inconsistent handling of unaligned hash inputs
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 3/3] Revert "crypto: aesni - disable "by8" AVX CTR optimization"
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: aesni - remove unused defines in "by8" variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: aesni - fix counter overflow handling in "by8" variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: aesni - fix and re-enable "by8" CTR variant
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: chandramouli narayanan <mouli@xxxxxxxxxxxxxxx>
- Crypto Fixes for 3.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni - disable "by8" AVX CTR optimization
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v4 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- [PATCH v4 00/12] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 05/12] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 06/12] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 07/12] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 03/12] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 08/12] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 04/12] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 09/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 12/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 10/12] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v4 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- tcrypt rfc4309 ccm test keys size issue
- From: "Leonidas S. Barbosa" <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Romain Francoise <romain@xxxxxxxxxxxxx>
- Re: RFC possible changes for Linux random device
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- RFC possible changes for Linux random device
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 3.13 056/187] crypto: ux500 - make interrupt mode plausible
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- [3.13.y.z extended stable] Patch "crypto: ux500 - make interrupt mode plausible" has been added to staging queue
- From: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
- Re: [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: qat: Qat driver fixes.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- v3.17-rc5: alg: skcipher: Test 4 failed on encryption for ctr-aes-aesni
- From: Romain Francoise <romain@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: Michał Mirosław <mirqus@xxxxxxxxx>
- RE: [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: "NiteshNarayanLal@xxxxxxxxxxxxx" <NiteshNarayanLal@xxxxxxxxxxxxx>
- [PATCH v3 00/12] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 01/12] crypto: LLVMLinux: Add macro to remove use of VLAIS in crypto code
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 02/12] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 03/12] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 06/12] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 04/12] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 07/12] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 09/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 11/12] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 10/12] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 12/12] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 08/12] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v3 05/12] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: qat: Fix typo in name of tasklet_struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/3] crypto: qat: Removed unneeded partial state
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: qat: Enable all 32 IRQs
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: qat: Qat driver fixes.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: slab kmalloc guard patch uncovers potential issue with crypto, triggered by cryptomgr_test
- From: Matt <jackdachef@xxxxxxxxx>
- [PATCH] crypto: talitos: Avoid excessive loops in softirq context
- From: Helmut Schaa <helmut.schaa@xxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security, crypto: LLVMLinux: Remove VLAIS from ima_crypto.c
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH] crypto: memzero_explicit - make sure to clear out sensitive data
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Scot Doyle <lkml14@xxxxxxxxxxxxx>
- [PATCH v2] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH v2] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/.../qat_algs.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/omap_sham.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/n2_core.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/mv_cesa.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: LLVMLinux: Remove VLAIS from crypto/ccp/ccp-crypto-sha.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH] crypto: ccp - Check for CCP before registering crypto algs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: AF_ALG inadvertently disabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- AF_ALG inadvertently disabled
- From: Scot Doyle <lkml14@xxxxxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 3.10 27/55] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.14 38/88] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.16 054/125] crypto: ux500 - make interrupt mode plausible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [patch added to the 3.12 stable tree] crypto: ux500 - make interrupt mode plausible
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH 3.12 42/56] crypto: ux500 - make interrupt mode plausible
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: Behan Webster <behanw@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH RFC 1/6] crypto, dm: LLVMLinux: Remove VLAIS usage from dm-crypt
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 5/6] apparmor: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 2/6] crypto: LLVMLinux: Remove VLAIS usage from crypto/hmac.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 3/6] crypto: LLVMLinux: Remove VLAIS usage from libcrc32c.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 6/6] btrfs: LLVMLinux: Remove VLAIS
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 4/6] crypto: LLVMLinux: Remove VLAIS usage from crypto/testmgr.c
- From: behanw@xxxxxxxxxxxxxxxxxx
- [PATCH RFC 0/6] LLVMLinux: Patches to enable the kernel to be compiled with clang/LLVM
- From: behanw@xxxxxxxxxxxxxxxxxx
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
- From: Nitesh Narayan Lal <b44382@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: mv_cesa.h: Add missing #define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: lz4,lz4hc - fix decompression
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
- From: Alexander Gordeev <agordeev@xxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: linux-next: Tree for Aug 26 (drbg)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] DRBG: fix sparse warning for cpu_to_be[32|64]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] DRBG: fix sparse warning for cpu_to_be[32|64]
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Linux-crypto: Do we have AES-CBC implementation using Intel SSSE3?
- From: Shuai Xiao <shuai.xiao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: SHA1 multibuffer implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] DRBG: efficiency patches
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix return value check in adf_chr_drv_create()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: caamhash.c fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] CAAM RNG4 fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: remove unused function argument
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: white space fix-ups on test_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] crypto: tcrypt: new user interface with debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- [PATCH] avoid excessive use of socket buffer in skcipher
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/crypto: remove redundant update of data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64/crypto: remove redundant update of data
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] drivers: crypto: mv_cesa.h: Add missing #define
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: lz4,lz4hc - fix decompression
- From: KOVACS Krisztian <hidden@xxxxxxxxxx>
- [PATCH 2/2] crypto: testmgr - add test for lz4 and lz4hc
- From: KOVACS Krisztian <hidden@xxxxxxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH v2 12/12] crypto: caam - add Run Time Library (RTA) docbook
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
- From: Alexander Gordeev <agordeev@xxxxxxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Kernel crypto API: cryptoperf performance measurement
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH 2/2] crypto: sahara - add support for SHA1/256
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: sahara - add support for i.MX53
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Kernel crypto API: cryptoperf performance measurement
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/8] DRBG: efficiency patches
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/8] DRBG: replace int2byte with cpu_to_be
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/8] DRBG: kzfree does not need a check for NULL pointer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/8] DRBG: remove superflowous checks
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/8] DRBG: remove superflowous memset(0)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/8] DRBG: use kmalloc instead of kzalloc for V and C
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 6/8] DRBG: remove unnecessary sanity checks
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 7/8] DRBG: remove configuration of fixed values
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 8/8] DRBG: remove unnecessary sanity check for shadow state
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH v2 12/12] crypto: caam - add Run Time Library (RTA) docbook
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 10/12] crypto: caam - refactor descriptor creation
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 11/12] crypto: caam - move caamalg shared descs in RTA library
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 02/12] crypto: caam - desc.h fixes
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 08/12] crypto: caam - use RTA instead of inline append
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 09/12] crypto: caam - completely remove inline append
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 07/12] crypto: caam - add Run Time Library (RTA) - part 3
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 06/12] crypto: caam - add Run Time Library (RTA) - part 2
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 04/12] crypto: caam - move sec4_sg_entry to sg_sw_sec4.h
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 05/12] crypto: caam - add Run Time Library (RTA) - part 1
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 01/12] crypto: caam - completely remove error propagation handling
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 03/12] crypto: caam - code cleanup
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2 00/12] crypto: caam - Add RTA descriptor creation library
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caamhash.c: remove duplicated sg copy functions
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: caamhash.c: fix addressing of struct member
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- caamhash.c fixes
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Fix return value check in adf_chr_drv_create()
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caam - enable raw data instead of von Neumann data
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 0/3] CAAM RNG4 fixes
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: caam - change starting entropy delay value
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: caam - disable RNG oscillator maximum frequency check
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: testmgr.c: white space removal on __test_skcipher
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: testmgr.c: white space removal on __test_skcipher
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [RFC] crypto: tcrypt: new user interface with debugfs
- From: Luca Clementi <luca.clementi@xxxxxxxxx>
- [PATCH 2/3] crypto: testmgr.c: white space removal on __test_skcipher
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: testmgr.c: delay execution of set-up code
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: testmgr.c: white space removal on __test_hash
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr.c: remove unused function argument
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: white space fix-ups on test_aead
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH v2] ARM: crypto: enable NEON SHA-1 for big endian
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Crypto Update for 3.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ARM: crypto: enable NEON SHA-384/SHA-512 for big endian
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] ARM: crypto: enable NEON SHA-1 for big endian
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: add support for TLS 1.0 record encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: HELP: IPsec reordering issue
- From: Ming Liu <liu.ming50@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: add support for TLS 1.0 record encryption
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] DRBG: fix failure of generating multiple of 2**16 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Do not sign extend input data to CCP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/testmgr: add missing spaces to drbg error strings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha: Switch to managed version of kzalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: use chunks smaller than algo block size in chunk tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: qat: Checkpatch and other cleanups plus SKU1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [net-next] crypto: Resolve shadow warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] Replacing spinlocks by nx_copy_ctx on NX-SHA256 and NX-SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: add support for TLS 1.0 record encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH] DRBG: fix failure of generating multiple of 2**16 bytes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: add support for TLS 1.0 record encryption
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add TLS record layer encryption module
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v6 1/6] sched: Add function single_task_running to let a task check if it is the only task running on a cpu
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 3/6] crypto: SHA1 multibuffer algorithm data structures
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 4/6] crypto: SHA1 multibuffer submit and flush routines for AVX2
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 2/6] crypto: multibuffer crypto infrastructure
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 5/6] crypto: SHA1 multibuffer crypto computation (x8 AVX2)
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 6/6] crypto: SHA1 multibuffer job manager and glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v6 0/6] crypto: SHA1 multibuffer implementation
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: PKCS#7: Verify internal certificate chain
- From: David Howells <dhowells@xxxxxxxxxx>
- Crypto Fixes for 3.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: properly label AF_ALG socket
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- re: PKCS#7: Verify internal certificate chain
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Ming Liu <liu.ming50@xxxxxxxxx>
- Re: HELP: IPsec reordering issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: Check if gas supports CRC32
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- HELP: IPsec reordering issue
- From: Ming Liu <liu.ming50@xxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] x86, crypto: Check if gas supports CRC32
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: Check if gas supports CRC32
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: Check if gas supports CRC32
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Do not sign extend input data to CCP
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] crypto/testmgr: add missing spaces to drbg error strings
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] x86, crypto: Check if gas supports CRC32
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: properly label AF_ALG socket
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Rolf Eike Beer <eike-kernel@xxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Bob Beck <beck@xxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto/testmgr: add missing spaces to drbg error strings
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH] crypto: properly label AF_ALG socket
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] [v3] crypto: sha512: add ARM NEON implementation
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] [v3] crypto: sha512: add ARM NEON implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] Add TLS record layer encryption module
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: add support for TLS 1.0 record encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: add TLS 1.0 test vectors for AES-CBC-HMAC-SHA1
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: DMA support for mv_cesa
- From: Muran Hrun <muuhuu@xxxxxxxxx>
- Re: DMA support for mv_cesa
- From: Phil Sutter <phil@xxxxxx>
- Re: DMA support for mv_cesa
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: DMA support for mv_cesa
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Crypto Fixes for 3.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] PKCS#7: fix sparse non static symbol warning
- From: David Howells <dhowells@xxxxxxxxxx>
- DMA support for mv_cesa
- From: Muran Hrun <muuhuu@xxxxxxxxx>
- [PATCH -next] PKCS#7: fix sparse non static symbol warning
- [PATCH] crypto: atmel-tdes: Switch to managed version of kzalloc
- From: pramod.gurav.etc@xxxxxxxxx
- [PATCH] crypto: atmel-sha: Switch to managed version of kzalloc
- From: pramod.gurav.etc@xxxxxxxxx
- [PATCH] crypto: testmgr.c: white space fix-ups on test_aead
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: use chunks smaller than algo block size in chunk tests
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: David Drysdale <drysdale@xxxxxxxxxx>
- Re: [PATCH] crypto: rng.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ablkcipher.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Mark D Rustad <mrustad@xxxxxxxxx>
- Re: [PATCH] crypto: crypto_user.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Mark D Rustad <mrustad@xxxxxxxxx>
- Re: [PATCH] crypto: rng.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Mark D Rustad <mrustad@xxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1 2/5] saa7164: convert to seq_hex_dump()
- From: Mauro Carvalho Chehab <m.chehab@xxxxxxxxxxx>
- Re: [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH] crypto: shash.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rng.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: pcompress.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: crypto_user.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: blkcipher.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ahash.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aead.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ablkcipher.c: Cleaning up missing null-terminate in conjunction with strncpy
- From: Rickard Strandqvist <rickard_strandqvist@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 2/2] arm aes: fix encryption of unaligned data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL] Keyrings: PKCS#7 fixup
- From: James Morris <jmorris@xxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH 2/2] arm aes: fix encryption of unaligned data
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH 1/2] arm64 aes: fix encryption of unaligned data
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH 10/10] crypto: qat: Fixed SKU1 dev issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 09/10] crypto: qat: Cleanup - Use hweight for bit counting
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 08/10] crypto: qat: Cleanup - Updated print outputs
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 07/10] crypto: qat: Cleanup - change ae_num to ae_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 06/10] crypto: qat: Cleanup - change slice->regions to slice->region
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 05/10] crypto: qat: Cleanup - use min_t macro
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 03/10] crypto: qat: Cleanup - remove unneeded header
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 02/10] crypto: qat: Cleanup - checkpatch blank lines
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 04/10] crypto: qat: Cleanup - remove unnecessary parentheses
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 01/10] crypto: qat: Cleanup - remove unnecessary return codes
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 00/10] crypto: qat: Checkpatch and other cleanups plus SKU1
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: General flags to turn things off (getrandom, pid lookup, etc)
- From: Dave Jones <davej@xxxxxxxxxx>
- General flags to turn things off (getrandom, pid lookup, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- [GIT PULL] Keyrings: PKCS#7 fixup
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ARM: sunxi: dt: Add DT bindings documentation for SUNXI Security System
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [net-next] crypto: Resolve shadow warnings
- From: Jeff Kirsher <jeffrey.t.kirsher@xxxxxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] crypto: SHA1 multibuffer crypto opportunistic flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH -v5] random: introduce getrandom(2) system call
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- [PATCH -v5] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 8/8] Replacing spinlocks by nx_copy_ctx on NX-SHA256 and NX-SHA512
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/8] Replacing spinlocks by nx_copy_ctx on NX-AES-XCBC
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/8] Replacing spinlocks by nx_copy_ctx on NX-AES-GCM
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/8] Replacing spinlocks by nx_copy_ctx on NX-AES-ECB
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/8] Replacing spinlocks by nx_copy_ctx on NX-AES-CTR
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/8] Replacing spinlocks by nx_copy_ctx on NX-AES-CCM
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] Replacing spinlocks by nx_copy_ctx on NX-AES-CBC
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] Adding nx_copy_ctx and kmemcache to handle with crypto context
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/8] NX crypto driver reestructure
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Keyrings and asymmetric keys patches for 3.17
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: ccp - Remove "select OF" from Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH] crypto: ccp - Remove "select OF" from Kconfig
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix DECO RSR polling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto/Kconfig: Let 'DEV_QCE' depend on both HAS_DMA and HAS_IOMEM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - set DK (Decrypt Key) bit only for AES accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto: testmgr - avoid DMA mapping from text, rodata, stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Base AXI DMA cache settings on device tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: Add Allwinner Security System crypto accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC, prePATCH] crypto: talitos modified for powerpc 88x security engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: initialize entry len for null input in crypto hash sg list walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] drivers/crypto/Kconfig: Let 'DEV_QCE' depend on both HAS_DMA and HAS_IOMEM
- From: Chen Gang <gang.chen.5i5j@xxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/10] crypto: testmgr - avoid DMA mapping from text, rodata, stack
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: caam - fix DECO RSR polling
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: testmgr - avoid DMA mapping from text, rodata, stack
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Manuel Schölling <manuel.schoelling@xxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 01/10] crypto: testmgr - avoid DMA mapping from text, rodata, stack
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH v5 1/7] sched: Add function single_task_running to let a task check if it is the only task running on a cpu
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 3/7] crypto: SHA1 multibuffer crypto opportunistic flush
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 6/7] crypto: SHA1 multibuffer crypto computation (x8 AVX2)
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 7/7] crypto: SHA1 multibuffer scheduler
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 5/7] crypto: SHA1 multibuffer submit and flush routines for AVX2
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 4/7] crypto: SHA1 multibuffer algorithm data structures
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 2/7] crypto: SHA1 multibuffer crypto hash infrastructure
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 0/7] crypto: SHA1 multibuffer implementation
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix DECO RSR polling
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [GIT PULL] Keyrings and asymmetric keys patches for 3.17
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Rolf Eike Beer <eike-kernel@xxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH -v4] random: introduce getrandom(2) system call
- From: Till Smejkal <till.smejkal@xxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: caam - Add RTA descriptor creation library
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - fix DECO RSR polling
- From: Horia Geanta <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: caam - Add RTA descriptor creation library
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Dwayne Litzenberger <dlitz@xxxxxxxxx>
- Re: [PATCH 0/25] Replace DEFINE_PCI_DEVICE_TABLE macro use
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Dwayne Litzenberger <dlitz@xxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH, RFC] random: introduce getrandom(2) system call
- From: "Theodore Ts'o" <tytso@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]