Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Will Deacon <will.deacon@xxxxxxx>
- randconfig build error with next-20131003, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: [PATCH v2 3/3] ARM: add support for bit sliced AES using NEON instructions
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- [PATCH v2 3/3] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] ARM: move AES typedefs and function prototypes to separate header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] ARM: pull in <asm/simd.h> from asm-generic
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Status of "kernel crypto services" patch? Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Correct RSA MPI dependency
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: crypto: GCM API usage
- From: tobias.polzer@xxxxxx
- Re: randconfig build error with next-20131002, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: randconfig build error with next-20131002, in crypto
- From: Borislav Petkov <bp@xxxxxxxxx>
- randconfig build error with next-20131002, in crypto
- From: Jim Davis <jim.epost@xxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Status of "kernel crypto services" patch? Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] Crypto: change all occurances of "kerneli" to kernel Bug #60848
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] Documentation: "kerneli" typo in description for "Serpent cipher algorithm" Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- [PATCH] Crypto: change all occurances of "kerneli" to kernel Bug #60848
- From: Kevin Mulvey <kevin@xxxxxxxxxxxxxxx>
- [PATCH] padata: make the sequence counter an atomic_t
- From: Mathias Krause <mathias.krause@xxxxxxxxxxx>
- [PATCH] sha256_ssse3: also test for BMI2
- Re: [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Hans Verkuil <hverkuil@xxxxxxxxx>
- [PATCH 2/2] crypto: mv_cesa: Remove redundant of_match_ptr
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/2] crypto: sahara: Remove redundant of_match_ptr
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Getting started with crypto drivers
- From: Emilio López <emilio@xxxxxxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Tobias Rauter <tobiasrauter@xxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 00/51] DMA mask changes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 31/51] DMA-API: media: omap3isp: use dma_coerce_mask_and_coherent()
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/51] DMA mask changes
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
- From: James Yonan <james@xxxxxxxxxxx>
- Re: IV generation in geode-aes
- From: Hamid Nassiby <h.nassiby@xxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Veli-Pekka Peltola <veli-pekka.peltola@xxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Vojtech Pavlik <vojtech@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Michal Marek <mmarek@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/3] ARM: mxs: crypto: Add Freescale MXS DCP driver
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 3/3] ARM: mxs: dts: Enable DCP for MXS
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 1/3] crypto: Fully restore ahash request before completing
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Archit Taneja <archit@xxxxxx>
- IV generation in geode-aes
- From: Sohail <sohailtariq25@xxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] crypto: caam - map src buffer before access
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- [PATCH] crypto: dcp: Check the return value from devm_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: dcp - Use devm_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: move ablk_helper out of arch/x86
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ansi_cprng: Fix off by one error in non-block size request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: tegra: remove tegra_chip_uid()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tegra-aes - Fix NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - map src buffer before access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mv_cesa - Staticize local symbols
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: caam - map src buffer before access
- From: Kim Phillips <kim.phillips@xxxxxxxxxx>
- Re: [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Phil Carmody <phil.carmody@xxxxxxxxxxxxxxxxxxx>
- Re: Asymmetric cryptography HW offloading
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 37/51] DMA-API: usb: use new dma_coerce_mask_and_coherent()
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Asymmetric cryptography HW offloading
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [alsa-devel] [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [alsa-devel] [PATCH 23/51] DMA-API: dma: pl08x: add dma_set_mask_and_coherent() call
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] crypto: dcp: Fix the path for releasing the resources
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/3] crypto: dcp: Use devm_request_irq()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/3] crypto: dcp: Use devm_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 22/51] DMA-API: amba: get rid of separate dma_mask
- From: Grant Likely <grant.likely@xxxxxxxxxx>
- Re: [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 0/4] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- [PATCH 4/4] ARM: add support for bit sliced AES using NEON instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] ARM: move AES typedefs and function prototypes to separate header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] ARM: pull in <asm/simd.h> from asm-generic
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] ARM: NEON based fast(er) AES in CBC/CTR/XTS modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3] crypto: caam - map src buffer before access
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Felipe Balbi <balbi@xxxxxx>
- [PATCH 16/51] DMA-API: ppc: vio.c: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 23/51] DMA-API: dma: pl08x: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Felipe Balbi <balbi@xxxxxx>
- [PATCH 09/51] DMA-API: net: broadcom/b44: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 38/51] DMA-API: staging: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 37/51] DMA-API: usb: use new dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- [PATCH 36/51] DMA-API: usb: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 34/51] DMA-API: net: octeon: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 33/51] DMA-API: net: nxp/lpc_eth: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 32/51] DMA-API: mmc: sdhci-acpi: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 14/51] DMA-API: net: b43: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH 31/51] DMA-API: media: omap3isp: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 30/51] DMA-API: dma: dw_dmac.c: convert to use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 29/51] DMA-API: ata: pata_octeon_cf: convert to use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 28/51] DMA-API: sound: fix dma mask handling in a lot of drivers
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 26/51] DMA-API: usb: ohci-sa1111: add a note about DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 27/51] DMA-API: provide a helper to setup DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 21/51] DMA-API: usb: ssb-hcd: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 25/51] DMA-API: video: clcd: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 20/51] DMA-API: usb: bcma: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 15/51] DMA-API: net: b43legacy: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 10/51] DMA-API: net: broadcom/bnx2x: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 19/51] DMA-API: media: dt3155v4l: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 12/51] DMA-API: net: intel/e1000: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 18/51] DMA-API: staging: et131x: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 13/51] DMA-API: net: sfc/efx.c: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 11/51] DMA-API: net: emulex/benet: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 24/51] DMA-API: dma: pl330: add dma_set_mask_and_coherent() call
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 22/51] DMA-API: amba: get rid of separate dma_mask
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 39/51] DMA-API: others: use dma_set_coherent_mask()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 46/51] ARM: DMA-API: better handing of DMA masks for coherent allocations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 45/51] DMA-API: firmware/google/gsmi.c: avoid direct access to DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 47/51] ARM: 7794/1: block: Rename parameter dma_mask to max_addr for blk_queue_bounce_limit()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 48/51] ARM: 7795/1: mm: dma-mapping: Add dma_max_pfn(dev) helper function
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 49/51] ARM: 7796/1: scsi: Use dma_max_pfn(dev) helper for bounce_limit calculations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 51/51] ARM: 7805/1: mm: change max*pfn to include the physical offset of memory
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: move x86 to the generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 42/51] DMA-API: usb: musb: use platform_device_register_full() to avoid directly messing with dma masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 40/51] DMA-API: crypto: fix ixp4xx crypto platform device support
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 41/51] DMA-API: crypto: remove last references to 'static struct device *dev'
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 43/51] DMA-API: dma: edma.c: no need to explicitly initialize DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 44/51] DMA-API: dcdbas: update DMA mask handing
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 50/51] ARM: 7797/1: mmc: Use dma_max_pfn(dev) helper for bounce_limit calculations
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 35/51] DMA-API: parport: parport_pc.c: use dma_coerce_mask_and_coherent()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Ben Hutchings <bhutchings@xxxxxxxxxxxxxx>
- [PATCH 17/51] DMA-API: block: nvme-core: replace dma_set_mask()+dma_set_coherent_mask() with new helper
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 08/51] DMA-API: net: intel/ixgbevf: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 01/51] DMA-API: provide a helper to set both DMA and coherent DMA masks
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 06/51] DMA-API: net: intel/ixgb: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 07/51] DMA-API: net: intel/ixgbe: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 05/51] DMA-API: net: intel/igbvf: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 04/51] DMA-API: net: intel/igb: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 03/51] DMA-API: net: intel/e1000e: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 02/51] DMA-API: net: brocade/bna/bnad.c: fix 32-bit DMA mask handling
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 00/51] DMA mask changes
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - map src buffer before access
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH] ansi_cprng: Fix off by one error in non-block size request
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: move x86 to the generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: create generic version of ablk_helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: GCM API usage
- From: Dominik Paulus <dominik@xxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] ARM: tegra: remove tegra_chip_uid()
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- crypto: GCM API usage
- From: dominik.d.paulus@xxxxxxxxxxxxxxxxxxxxxxx
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] crypto: move ablk_helper out of arch/x86
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH 2/2] crypto: tegra-aes: Use devm_clk_get
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/2] crypto: tegra-aes: Fix NULL pointer dereference
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- [PATCH] crypto_mem_not_equal: add constant-time equality testing of memory regions
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [PATCH V4 01/15] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 03/15] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 02/15] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 04/15] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 05/15] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 06/15] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 07/15] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 08/15] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 09/15] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/15] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 11/15] Hibernate: taint kernel when signature check fail
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 12/15] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 13/15] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 14/15] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH V4 15/15] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [RFC V4 PATCH 00/15] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [RFC PATCH 1/2] crypto: move ablk_helper out of arch/x86
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] arm64: add support for AES using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/2] crypto: move ablk_helper out of arch/x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/2] AES in CBC/CTR/XTS modes using ARMv8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Crypto Fixes for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 3.12
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: caam - RNG4 patches and fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86: restore avx2_supported check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha256_ssse3 - use correct module alias for sha224
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: tegra-aes - Staticize tegra_aes_cra_exit
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 2/3] crypto: omap-aes - Staticize local symbols
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- [PATCH 1/3] crypto: mv_cesa - Staticize local symbols
- From: Sachin Kamat <sachin.kamat@xxxxxxxxxx>
- Crypto Fixes for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: question about rfc404 support.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Waiman Long <waiman.long@xxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [3.12-rc1] Dependency on module-init-tools >= 3.11 ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- question about rfc404 support.
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- Re: sd_mod - uknown symbol crc_t10_diff [was Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied]
- From: Arthur Marsh <arthur.marsh@xxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam - map src buffer before access
- From: Yashpal Dutta <yashpal.dutta@xxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto:caam:Map src buffer before access in CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] drivers/crypto:caam:Map src buffer before access in CAAM driver
- From: <Yashpal.Dutta@xxxxxxxxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto_memcmp: add constant-time memcmp
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH] crypto_memcmp: add constant-time memcmp
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- [PATCH 4/7] crypto: caam - split RNG4 instantiation function
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 7/7] crypto: caam - enable instantiation of all RNG4 state handles
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 6/7] crypto: caam - fix RNG4 AAI defines
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 3/7] crypto: caam - fix RNG4 instantiation
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 5/7] crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 2/7] crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 0/7] crypto: caam - RNG4 patches and fixes
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 1/7] crypto: caam - fix RNG state handle instantiation descriptor
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH][RFC] Tests on 200 different CPUs/Arches and OSes with CPU Jitter RNG (resent)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: tegra: use kernel entropy instead of ad-hoc
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: James Yonan <james@xxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race condition in crypto larval handling
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Crypto Update for 3.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- race condition in crypto larval handling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: x86: restore avx2_supported check
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- [PATCH] crypto: sha256_ssse3 - use correct module alias for sha224
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Mistake ?
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- Re: Mistake ?
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxx>
- possible race in crypto_alg_mod_lookup
- From: James Yonan <james@xxxxxxxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matt Fleming <matt@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix bitoperation for compilation with clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Series of fixes for NX driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Rajendra Nayak <rnayak@xxxxxx>
- Re: [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 1/3] crypto: omap-des: Add omap-des driver for OMAP4/AM43xx
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 0/3] crypto: omap-des: Add driver for OMAP DES module
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 3/3] crypto: omap-des: Add triple DES (des3_ede) support to driver
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 2/3] crypto: omap-des: Add config and build options
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Pavel Machek <pavel@xxxxxxx>
- [PATCH] Fix bitoperation for compilation with clang
- [PATCH v2 00/10] Series of fixes for NX driver
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/10] crypto: nx - add offset to nx_build_sg_lists()
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 04/10] crypto: nx - fix limits to sg lists for AES-CTR
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/10] crypto: nx - fix limits to sg lists for AES-GCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 06/10] crypto: nx - fix limits to sg lists for AES-XCBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 07/10] crypto: nx - fix limits to sg lists for AES-CCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: nx - fix SHA-2 for chunks bigger than block size
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 09/10] crypto: nx - fix GCM for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/10] crypto: nx - fix XCBC for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/10] crypto: nx - fix limits to sg lists for AES-ECB
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Manfred Hollstein <mhollstein@xxxxxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Jiri Kosina <jiri.kosina@xxxxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: joeyli <jlee@xxxxxxxx>
- Announce loop-AES-v3.7a file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 08/18] Secure boot: Add new capability
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH 01/10] crypto: nx - add offset to nx_build_sg_lists()
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 00/10] Series of fixes for NX driver
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/10] crypto: nx - fix limits to sg lists for AES-ECB
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] crypto: nx - fix limits to sg lists for AES-CTR
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/10] crypto: nx - fix limits to sg lists for AES-CBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/10] crypto: nx - fix limits to sg lists for AES-XCBC
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] crypto: nx - fix limits to sg lists for AES-CCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/10] crypto: nx - fix XCBC for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 09/10] crypto: nx - fix GCM for zero length messages
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/10] crypto: nx - fix SHA-2 for chunks bigger than block size
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/10] crypto: nx - fix limits to sg lists for AES-GCM
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH] kernel/padata.c: Register hotcpu notifier after initialization
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- [RFC PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 02/18] asymmetric keys: implement EMSA_PKCS1-v1_5-ENCODE in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 04/18] asymmetric keys: implement OS2IP in rsa
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 05/18] asymmetric keys: implement RSASP1
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 06/18] asymmetric keys: support parsing PKCS #8 private key information
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 07/18] asymmetric keys: explicitly add the leading zero byte to encoded message
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 08/18] Secure boot: Add new capability
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 09/18] Secure boot: Add a dummy kernel parameter that will switch on Secure Boot mode
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 10/18] efi: Enable secure boot lockdown automatically when enabled in firmware
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 12/18] Hibernate: generate and verify signature of snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 13/18] Hibernate: Avoid S4 sign key data included in snapshot image
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 14/18] Hibernate: applied SNAPSHOT_VERIFICATION config to switch signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 15/18] Hibernate: adapt to UEFI secure boot with signature check
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 16/18] Hibernate: show the verification time for monitor performance
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 17/18] Hibernate: introduced SNAPSHOT_SIG_HASH config for select hash algorithm
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 18/18] Hibernate: notify bootloader regenerate key-pair for snapshot verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 03/18] asymmetric keys: separate the length checking of octet string from RSA_I2OSP
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 01/18] asymmetric keys: add interface and skeleton for implement signature generation
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 00/18 v3] Signature verification of hibernate snapshot
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v2] kernel/padata.c: share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Jan-Simon Möller <dl9pf@xxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: "PaX Team" <pageexec@xxxxxxxxxxx>
- Re: [PATCH] hwrng: reorder OMAP TRNG driver code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: omap-sham: Misc updates for driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: tegra-aes - bitwise vs logical and
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sahara - checking the wrong variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] crypto: omap-aes: Improve DMA, add PIO mode and support for AM437x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto:nx - fix nx-aes-gcm verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add option for enabling DEBUG mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] Check for osxsave as well as avx in crypto/xor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto/camellia_generic.c: replace commas by semicolons and adjust code alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: reorder OMAP TRNG driver code
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 04/14] crypto: omap-aes: Simplify DMA usage by using direct SGs
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH] hwrng: reorder OMAP TRNG driver code
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [patch] crypto: tegra-aes - bitwise vs logical and
- From: Stephen Warren <swarren@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: omap-sham: correct dma burst size
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 1/2] crypto: omap-sham: Enable Polling mode if DMA fails
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 0/2] crypto: omap-sham: Misc updates for driver
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH v2 04/14] crypto: omap-aes: Simplify DMA usage by using direct SGs
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [patch] crypto: tegra-aes - bitwise vs logical and
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch] crypto: sahara - checking the wrong variable
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH][RFC] Tests on 200 different CPUs/Arches and OSes with CPU Jitter RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- [PATCH] kernel/padata.c: always check the return value of __padata_remove_cpu() and __padata_add_cpu()
- From: Chen Gang <gang.chen@xxxxxxxxxxx>
- [PATCH][RFC] Tests on 200 different CPUs/Arches and OSes with CPU Jitter RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/14] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH v2 02/14] crypto: omap-aes: Add useful debug macros
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 11/14] crypto: omap-aes: Add support for cases of unaligned lengths
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 14/14] crypto: omap-aes: Kconfig: Add build support for AM437x
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 03/14] crypto: omap-aes: Populate number of SG elements
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 09/14] crypto: omap-aes: PIO mode: platform data for OMAP4/AM437x and trigger
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 04/14] crypto: omap-aes: Simplify DMA usage by using direct SGs
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 05/14] crypto: omap-aes: Sync SG before DMA operation
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 10/14] crypto: omap-aes: Switch to PIO mode during probe
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 02/14] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 06/14] crypto: omap-aes: Remove previously used intermediate buffers
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 12/14] crypto: omap-aes: Convert kzalloc to devm_kzalloc
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 00/14] crypto: omap-aes: Improve DMA, add PIO mode and support for AM437x
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 08/14] crypto: omap-aes: PIO mode: Add IRQ handler and walk SGs
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 07/14] crypto: omap-aes: Add IRQ info and helper macros
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 13/14] crypto: omap-aes: Convert request_irq to devm_request_irq
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH v2 01/14] crypto: scatterwalk: Add support for calculating number of SG elements
- From: Joel Fernandes <joelf@xxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [RFC] [PATCH] Fix for a warning - crypto/fcrypt,c
- From: Jan-Simon Möller <dl9pf@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH 00/10] crypto: omap-aes: DMA and PIO mode improvements
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: omap-aes: DMA and PIO mode improvements
- From: Dmitry Kasatkin <d.kasatkin@xxxxxxxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH 00/10] crypto: omap-aes: DMA and PIO mode improvements
- From: Joel Fernandes <joelf@xxxxxx>
- Re: [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 02/10] crypto: omap-aes: Add useful debug macros
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 08/10] crypto: omap-aes: PIO mode: Add IRQ handler and walk SGs
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 07/10] crypto: omap-aes: Add IRQ info and helper macros
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 09/10] crypto: omap-aes: PIO mode: platform data for OMAP4 and trigger it
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 10/10] crypto: omap-aes: Switch to PIO mode in probe function
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 05/10] crypto: omap-aes: Sync SG before DMA operation
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 04/10] crypto: omap-aes: Simplify DMA usage by using direct SGs
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 01/10] crypto: scatterwalk: Add support for calculating number of SG elements
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 06/10] crypto: omap-aes: Remove previously used intermediate buffers
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 00/10] crypto: omap-aes: DMA and PIO mode improvements
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH 03/10] crypto: omap-aes: Populate number of SG elements
- From: Joel Fernandes <joelf@xxxxxx>
- [PATCH] crypto:nx - fix nx-aes-gcm verification
- From: jmlatten@xxxxxxxxxxxxxxxxxx
- [PATCH 2/2] crypto: caam - add option for enabling DEBUG mode
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam - replace xstr macro with __stringify
- From: Alex Porosanu <alexandru.porosanu@xxxxxxxxxxxxx>
- [PATCH 1/1] Check for osxsave as well as avx in crypto/xor
- From: John Haxby <john.haxby@xxxxxxxxxx>
- [PATCH 0/1] Check for osxsave as well as avx in crypto/xor
- From: John Haxby <john.haxby@xxxxxxxxxx>
- [PATCH 1/2] arch/x86/crypto/camellia_glue.c: replace commas by semicolons and adjust code alignment
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/2] crypto/camellia_generic.c: replace commas by semicolons and adjust code alignment
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [PATCH] crypto: nx - fix concurrency issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: make tables used from assembler __visible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara - Staticize local symbol
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] arch/x86/crypto/camellia_glue.c: adjust code alignment
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 1/2] arch/x86/crypto/camellia_glue.c: adjust code alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: Questions about the Crypto API
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: nx - fix concurrency issue
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ARM: dts: mxs: set dcp to "disabled" by default
- From: Kumar Gala <galak@xxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ARM: dts: mxs: set dcp to "disabled" by default
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ARM: dts: mxs: set dcp to "disabled" by default
- From: Shawn Guo <shawn.guo@xxxxxxxxxx>
- [PATCH] crypto: make tables used from assembler __visible
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- [PATCH 1/2] arch/x86/crypto/camellia_glue.c: adjust code alignment
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/2] crypto/camellia_generic.c: adjust code alignment
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [PATCH 2/5] crypto/camellia_generic.c: convert comma to semicolon
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 2/5] crypto/camellia_generic.c: convert comma to semicolon
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 3/5] arch/x86/crypto/camellia_glue.c: convert comma to semicolon
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 2/5] crypto/camellia_generic.c: convert comma to semicolon
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: Questions about the Crypto API
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: omap-sham: Add OMAP5/AM43XX SHAM Support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: Questions about the Crypto API
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: crypto4xx - Staticize local symbols
- From: Jingoo Han <jg1.han@xxxxxxxxxxx>
- [PATCH 1/2] crypto: sahara - Staticize local symbol
- From: Jingoo Han <jg1.han@xxxxxxxxxxx>
- Re: [PATCH v2] drivers/crypto/nx: saves chaining value from co-processor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] hwrng: OMAP: Updates for OMAP RNG module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] drivers/crypto/nx: fixes when input data is too large
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/crypto/nx: saves chaining value from co-processor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/crypto/nx: saves chaining value from co-processor
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] ARM: dts: mxs: dcp cleanup patches
- From: Kumar Gala <galak@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: dcp: rename 'compatible' property to 'fsl,dcp'
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- RE: Questions about the Crypto API
- From: Garg Vakul-B16394 <B16394@xxxxxxxxxxxxx>
- [PATCH 0/3] ARM: dts: mxs: dcp cleanup patches
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: dcp: rename 'compatible' property to 'fsl,dcp'
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- RE: Questions about the Crypto API
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- [PATCH 1/3] ARM: dts: mxs: set dcp to "disabled" by default
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: dcp - cleanup: commas at end of struct initializers where appropriate
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/crypto/nx: saves chaining value from co-processor
- From: Michael Ellerman <michael@xxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] drivers/crypto/nx: saves chaining value from co-processor
- From: Fionnuala Gunter <fin@xxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: Questions about the Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Questions about the Crypto API
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] hwrng: OMAP: Use module_platform_driver macro
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 0/6] hwrng: OMAP: Updates for OMAP RNG module
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 3/6] hwrng: OMAP: Remove duplicated function call
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 6/6] hwrng: OMAP: Add OMAP4 TRNG support
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 5/6] ARM: OMAP2+: Only manually add hwmod data when DT not used.
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 2/6] hwrng: OMAP: Convert to devm_kzalloc()
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 4/6] hwrng: OMAP: Add device tree support
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH][RFC] CPU Jitter random number generator (resent)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] drivers/crypto/nx: saves chaining value from co-processor
- From: Fionnuala Gunter <fin@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] drivers/crypto/nx: fix physical addresses added to sg lists
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] drivers/crypto/nx: fixes when input data is too large
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove double execution of the same test suite
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] drivers/crypto/nx: fixes when input data is too large
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: remove double execution of the same test suite
- From: Stoica Cristian-B18196 <B18196@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Remove unused functions from Job Ring
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: omap-sham: Add support for SHA384/SHA512 for OMAP5/AM43xx Soc's
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: crypto: ux500: Fix logging, make arrays const, neatening
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - RNG instantiation by directly programming DECO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove double execution of the same test suite
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: remove double execution of the same test suite
- From: Stoica Cristian-B18196 <B18196@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - Remove unused functions from Job Ring
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] drivers/crypto/nx: fix limits to sg lists for SHA-2
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] drivers/crypto/nx: fixes when input data is too large
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] drivers/crypto/nx: fix physical addresses added to sg lists
- From: Marcelo Cerri <mhcerri@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: omap-sham: Convert to devm_kzalloc()
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 3/4] crypto: omap-sham: Convert to devm_request_irq()
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 1/4] crypto: omap-sham: Add SHA384 and SHA512 Support
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 2/4] crypto: omap-sham: Add OMAP5/AM43XX SHAM Support
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- [PATCH 0/4] crypto: omap-sham: Add support for SHA384/SHA512 for OMAP5/AM43xx Soc's
- From: Lokesh Vutla <lokeshvutla@xxxxxx>
- Re: [PATCH] modules: add support for soft module dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] modules: add support for soft module dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [BUG] 3.11 boot failure caused by commit crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [BUG] 3.11 boot failure caused by commit crypto
- From: Zhao Hongjiang <zhaohongjiang@xxxxxxxxxx>
- Re: crypto: ux500: Fix logging, make arrays const, neatening
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: crypto: ux500: Fix logging, make arrays const, neatening
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- crypto/built-in.o:undefined reference to `RSA_public_key_algorithm'
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to moduledependency.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- crypto/built-in.o:undefined reference to `RSA_public_key_algorithm'
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to moduledependency.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: remove double execution of the same test suite
- From: Gupta Ruchika-R66431 <R66431@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove double execution of the same test suite
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: "Rafael J. Wysocki" <rafael.j.wysocki@xxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: remove double execution of the same test suite
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to module dependency.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Suggestion for 3DES driver
- From: Joel Fernandes <joelf@xxxxxx>
- [RFC][PATCH 00/20] ima: larger digests and template support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 20/20] ima: enable support for larger default filedata hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 13/20] ima: new templates management mechanism
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 16/20] ima: switch to new template management mechanism
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 14/20] ima: define template fields library and new helpers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 17/20] ima: defer determining the appraisal hash algorithm for 'ima' template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 18/20] ima: add Kconfig default measurement list template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 19/20] ima: define kernel parameter 'ima_template=' to change configured default
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 15/20] ima: define new template ima-ng and template fields d-ng and n-ng
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 11/20] ima: pass the filename argument up to ima_add_template_entry()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 12/20] ima: define new function ima_alloc_init_template() to API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 10/20] ima: pass the file descriptor to ima_add_violation()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 09/20] ima: ima_calc_boot_agregate must use SHA1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 07/20] ima: provide dedicated hash algo allocation function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 08/20] ima: support arbitrary hash algorithms in ima_calc_buffer_hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 06/20] ima: differentiate between template hash and file data hash sizes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 04/20] ima: read and use signature hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 05/20] ima: use dynamically allocated hash storage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 03/20] ima: provide support for arbitrary hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 01/20] crypto: provide single place for hash algo information
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 02/20] keys: change asymmetric keys to use common hash definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure duetomoduledependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure duetomoduledependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure duetomoduledependency.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due tomoduledependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due tomoduledependency.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- crypto: ux500: Fix logging, make arrays const, neatening
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 3.11-rc1] crypto: Fix boot failure due to moduledependency.
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied
- From: Arthur Marsh <arthur.marsh@xxxxxxxxxxxxxxxx>
- Re: [PATCH][RESEND] crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][RESEND] crypto: caam - Fixed the memory out of bound overwrite issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH][RESEND] crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h
- From: Vakul Garg <vakul@xxxxxxxxxxxxx>
- [PATCH][RESEND] crypto: caam - Fixed the memory out of bound overwrite issue
- From: Vakul Garg <vakul@xxxxxxxxxxxxx>
- Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied
- From: Arthur Marsh <arthur.marsh@xxxxxxxxxxxxxxxx>
- Re: unable to finish booting when "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework" applied
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Crypto Update for 3.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - RNG instantiation by directly programming DECO
- From: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>
- Announce loop-AES-v3.6i file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] fix typo in comment
- From: Cristian Stoica <cristian.stoica@xxxxxxxxxxxxx>
- Re: Crypto Fixes for 3.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Various ux500 crypto updates
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 0/6] Various ux500 crypto updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Various ux500 crypto updates
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/6] crypto: ux500/hash: use readl on iomem addresses
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 3/6] crypto: ux500/crypt: add missing __iomem qualifiers
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 4/6] crypto: ux500: use dmaengine_device_control API
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 5/6] crypto: ux500: use dmaengine_prep_slave_sg API
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 6/6] crypto: ux500: use dmaengine_submit API
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 2/6] crypto: ux500/hash: add missing static qualifiers
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- [PATCH 0/6] Various ux500 crypto updates
- From: Fabio Baltieri <fabio.baltieri@xxxxxxxxxx>
- Re: [PATCH v3 2/4] lib/scatterlist: introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH crypto] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH crypto] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] lib/scatterlist: introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v3 3/4] crypto: talitos: use sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v3 1/4] lib/scatterlist: factor out sg_miter_get_next_page() from sg_miter_next()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v3 0/4] introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- Re: [PATCH 1/4] crypto: testmgr - check that entries in alg_test_descs are in correct order
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Revert "crypto: blowfish - add AVX2/x86_64 implementation of blowfish cipher"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: camellia-aesni-avx2 - tune assembly code for more performance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 3.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH crypto] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- [PATCH crypto] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
- Re: [PATCH v2 2/4] lib/scatterlist: introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- Re: [PATCH v2 2/4] lib/scatterlist: introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v2 1/4] lib/scatterlist: factor out sg_miter_get_next_page() from sg_miter_next()
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH v2 0/4] introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v2 1/4] lib/scatterlist: factor out sg_miter_get_next_page() from sg_miter_next()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v2 3/4] crypto: talitos: use sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [PATCH v2 2/4] lib/scatterlist: introduce sg_pcopy_from_buffer() and sg_pcopy_to_buffer()
- From: Akinobu Mita <akinobu.mita@xxxxxxxxx>
- [RFC, PATCH] crypto: algboss: fix NULL pointer dereference in cryptomgr_probe
- From: Daniel Borkmann <dborkman@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]