Linux Crypto
[Prev Page][Next Page]
- [PATCH v2.1 5/7] crypto: digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 3/7] crypto: GnuPG based MPI lib - make files (part 3)
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 2/7] crypto: GnuPG based MPI lib - header files (part 2)
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 1/7] crypto: GnuPG based MPI lib - source files (part 1)
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 7/7] evm: digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 4/7] crypto: GnuPG based MPI lib - additional sources (part 4)
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2.1 0/7] evm: digital signature verification extension
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: CONFIG_CRYPTO_PCRYPT, CONFIG_CRYPTO_CRYPTD etc. questions
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC]: do_xor_speed Broken on UML do to jiffies
- From: Boaz Harrosh <bharrosh@xxxxxxxxxxx>
- [PATCH] crypto: testmgr: add twofish tests
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH] crypto: testmgr: add blowfish test-vectors
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH] crypto: Make hifn_795x build depend on !ARCH_DMA_ADDR_T_64BIT
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH] crypto: twofish-x86_64-3way: fix ctr blocksize to 1
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH] crypto: blowfish-x86_64: fix ctr blocksize to 1
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- CONFIG_CRYPTO_PCRYPT, CONFIG_CRYPTO_CRYPTD etc. questions
- From: Sverd Johnsen <sverd.johnsen@xxxxxxxxxxxxxx>
- [PATCH v5.1 4/4] crc32: Select an algorithm via kconfig
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v5 0/4] crc32c: Add faster algorithm and self-test code
- From: Joakim Tjernlund <joakim.tjernlund@xxxxxxxxxxxx>
- Re: [PATCH v5 0/4] crc32c: Add faster algorithm and self-test code
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Hamid Nassiby <h.nassiby@xxxxxxxxx>
- [PATCH 1/4] crc32: Bolt on crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 2/4] crypto: crc32c should use library implementation
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 3/4] crc32: Add self-test code for crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 4/4] crc32: Select an algorithm via kconfig
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH v5 0/4] crc32c: Add faster algorithm and self-test code
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Joakim Tjernlund <joakim.tjernlund@xxxxxxxxxxxx>
- Re: [PATCH v3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Joakim Tjernlund <joakim.tjernlund@xxxxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Joakim Tjernlund <joakim.tjernlund@xxxxxxxxxxxx>
- Re: [PATCH v3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: Joakim Tjernlund <joakim.tjernlund@xxxxxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Hamid Nassiby <h.nassiby@xxxxxxxxx>
- [PATCH] crypto: picoxcell: add dependency on HAVE_CLK
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH v4] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: "Kasatkin, Dmitry" <dmitry.kasatkin@xxxxxxxxx>
- RFC: redesigning random(4)
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] libcrc32c: Expose big-endian version of crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH 2/3] libcrc32c: Expose big-endian version of crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: "Kasatkin, Dmitry" <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 2/3] libcrc32c: Expose big-endian version of crc32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crc32c: Add faster algorithm and self-test code
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 2/3] libcrc32c: Expose big-endian version of crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH v2 0/3] crc32c: Add faster algorithm and self-test code
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 1/3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH v4 17/17] crypto: Add userspace report for compress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 16/17] crypto: Add userspace report for cipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 15/17] crypto: Add userspace report for rng type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 14/17] crypto: Add userspace report for pcompress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 13/17] crypto: Add userspace report for nivaead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 12/17] crypto: Add userspace report for aead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 11/17] crypto: Add userspace report for givcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 10/17] crypto: Add userspace report for ablkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 09/17] crypto: Add userspace report for blkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 08/17] crypto: Add userspace report for ahash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] whirlpool: count rounds from 0
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- [PATCH v4 07/17] crypto: Add userspace report for shash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 06/17] crypto: Add userspace report for larval type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 05/17] crypto: Add a report function pointer to crypto_type
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 04/17] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 03/17] crypto: Export crypto_remove_final
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 02/17] crypto: Export crypto_remove_spawns
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 01/17] crypto: Add a flag to identify crypto instances
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v4 00/17] crypto user configuration api
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 3/3] crypto: twofish: add 3-way parallel x86_64 assembler implemention
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH 2/3] crypto: twofish-x86-asm: make assembler functions use twofish_ctx instead of crypto_tfm
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH 1/3] crypto: tcrypt: add ctr(twofish) speed test
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- Re: [PATCH v3 04/17] crypto: Add userspace configuration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/17] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: "Kasatkin, Dmitry" <dmitry.kasatkin@xxxxxxxxx>
- random(4) overheads question
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v3 10/17] crypto: Add userspace report for ablkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: cryptodev tree on github
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] talitos: handle descriptor not found in error path
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/17] crypto: Add userspace report for ablkcipher type algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: blowfish-x86_64: add credits
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [PATCH 1/2] crypto: blowfish-x86_64: improve x86_64 blowfish 4-way performance
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- Re: [PATCH v3 04/17] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v3 04/17] crypto: Add userspace configuration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: cryptodev tree on github
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: blowfish - split generic and common c code
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- cryptodev tree on github
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1.c: quite sparse noise about symbol not declared
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: blowfish - split generic and common c code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 29/55] crypto: irq: Remove IRQF_DISABLED
- From: Yong Zhang <yong.zhang0@xxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 29/57] crypto: irq: Remove IRQF_DISABLED
- From: Yong Zhang <yong.zhang0@xxxxxxxxx>
- [PATCH v3 17/17] crypto: Add userspace report for compress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 16/17] crypto: Add userspace report for cipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 15/17] crypto: Add userspace report for rng type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 14/17] crypto: Add userspace report for pcompress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 13/17] crypto: Add userspace report for nivaead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 12/17] crypto: Add userspace report for aead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 11/17] crypto: Add userspace report for givcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 10/17] crypto: Add userspace report for ablkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 09/17] crypto: Add userspace report for blkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 08/17] crypto: Add userspace report for ahash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 07/17] crypto: Add userspace report for shash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 06/17] crypto: Add userspace report for larval type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 05/17] crypto: Add a report function pointer to crypto_typ
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 04/17] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 03/17] crypto: Export crypto_remove_final
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 02/17] crypto: Export crypto_remove_spawns
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 01/17] crypto: Add a flag to identify crypto instances
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v3 00/17] crypto user configuration api
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: Kernel OOPS with Freescale talitos driver on ppc
- From: Sven Schnelle <svens@xxxxxxxxxxxxxx>
- Re: [RFC v2.1 0/6] evm: digital signature verification extension
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Kernel OOPS with Freescale talitos driver on ppc
- From: Sven Schnelle <svens@xxxxxxxxxxxxxx>
- Re: Kernel OOPS with Freescale talitos driver on ppc
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Kernel OOPS with Freescale talitos driver on ppc
- From: Sven Schnelle <svens@xxxxxxxxxxxxxx>
- Re: [[RFC] PATCH 4/4] crypto: blowfish: add x86_64 assembly implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [[RFC] PATCH 4/4] crypto: blowfish: add x86_64 assembly implementation
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- Re: [PATCH] lib/sha1.c: quite sparse noise about symbol not declared
- [RFC v2.1 1/6] crypto: GnuPG based MPI lib - source files needed for ksign
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 2/6] crypto: GnuPG based MPI lib - header files needed for ksign
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 3/6] crypto: GnuPG based MPI lib - make files needed for ksign
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 5/6] crypto: ksign - digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 6/6] evm: digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 4/6] crypto: GnuPG based MPI lib - extra MPI sources
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.1 0/6] evm: digital signature verification extension
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Mark Brown <broonie@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] random: add blocking facility to urandom
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] aes_glue.c: quiet sparse noise about symbol not declared
- From: H Hartley Sweeten <hartleys@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: "Ted Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sven-Haegar Koch <haegar@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: "Ted Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Stephan Mueller <stephan.mueller@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: "Ted Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC v2.0 0/3] evm: digital signature verification extension
- From: Sam Gandhi <samgandhi9@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: "Ted Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Stephan Mueller <stephan.mueller@xxxxxxxxx>
- Re: [RFC v2.0 3/3] evm: digital signature support
- From: "Kasatkin, Dmitry" <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.0 3/3] evm: digital signature support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.0 3/3] evm: digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.0 2/3] crypto: ksign - digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v2.0 0/3] evm: digital signature verification extension
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] random: add blocking facility to urandom
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: IPsec performance (in)dependent on ingress rate?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] random: add blocking facility to urandom
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH v2 02/15] crypto: Add userspace configuration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [[RFC] PATCH 2/4] crypto: blowfish: rename C-version to blowfish_generic
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [[RFC] PATCH 4/4] crypto: blowfish: add x86_64 assembly implementation
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [[RFC] PATCH 1/4] crypto: blowfish: split generic and common c code
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- [[RFC] PATCH 3/4] crypto: tcrypt: add ctr(blowfish) speed test
- From: Jussi Kivilinna <jussi.kivilinna@xxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Phil Sutter <phil@xxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- IPsec performance (in)dependent on ingress rate?
- From: Adam Tisovsky <tisovsky@xxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Phil Sutter <phil@xxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- RE: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Bob Pearson" <rpearson@xxxxxxxxxxxxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Bob Pearson" <rpearson@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crc32c: Implement CRC32c with slicing-by-8 algorithm
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 3/3] crc32c: Implement a self-test for CRC32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH v1 0/3] crc32c: Add faster algorithm and self-test code
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- [PATCH 2/3] libcrc32c: Expose big-endian version of crc32c
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [Cryptodev-linux-devel] comparison of the AF_ALG interface with the /dev/crypto
- From: Phil Sutter <phil@xxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm: convert k{un}map_atomic(p, KM_type) to k{un}map_atomic(p)
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/15] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: comparison of the AF_ALG interface with the /dev/crypto
- From: David Miller <davem@xxxxxxxxxxxxx>
- comparison of the AF_ALG interface with the /dev/crypto
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH v2 02/15] crypto: Add userspace configuration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [RFC] ah4: use passed-in value of err in ah_output_done
- From: Yuan Kang <Yuan.Kang@xxxxxxxxxxxxx>
- IPSec for data over raw socket
- From: "Prashant Batra (prbatra)" <prbatra@xxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v2 15/15] crypto: Add userspace report for compress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 14/15] crypto: Add userspace report for cipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 13/15] crypto: Add userspace report for rng type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 12/15] crypto: Add userspace report for pcompress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 11/15] crypto: Add userspace report for nivaead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 10/15] crypto: Add userspace report for aead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 09/15] crypto: Add userspace report for givcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 08/15] crypto: Add userspace report for ablkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 07/15] crypto: Add userspace report for blkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 06/15] crypto: Add userspace report for ahash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 05/15] crypto: Add userspace report for shash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 04/15] crypto: Add userspace report for larval type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 03/15] crypto: Add a report function pointer to crypto_type
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 02/15] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 01/15] crypto: Add a flag to identify crypto instances
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 00/15] crypto user configuration api
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto, x86: assembler implementation of SHA1
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [RFC v1.1 2/5] crypto: ksign - digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v1.1 3/5] evm: digital signature support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC v1.1 2/5] crypto: ksign - digital signature verification support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC v1.1 1/5] crypto: GnuPG based MPI lib
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] n2_crypto: Fix a get/put_cpu() imbalance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] n2_crypto: Fix a get/put_cpu() imbalance
- From: Thomas Meyer <thomas@xxxxxxxx>
- Re: RSA
- From: Michel Machado <michel@xxxxxxxxxxxxxxx>
- Re: RSA
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- RSA
- From: Michel Machado <michel@xxxxxxxxxxxxxxx>
- [PATCH] crypto: aesni-intel - Add ivsize to ablk_ecb_alg
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: Cryptomgr race vs built-in aesni
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [RFC v1.1 0/5] evm: digital signature extension
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v1.1 4/5] ksign: provides keyring to search in for the key
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v1.1 3/5] evm: digital signature support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v1.1 5/5] evm: creates dedicated evm keyring to store public keys
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [RFC v1.1 2/5] crypto: ksign - digital signature verification support
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Andrew Lutomirski <luto@xxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Andy Lutomirski <luto@xxxxxxx>
- [PATCH 16/16] crypto: Add userspace report for compress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 15/16] crypto: Add userspace report for cipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 14/16] crypto: Add userspace report for rng type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 13/16] crypto: Add userspace report for pcompress type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 12/16] crypto: Add userspace report for nivaead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 11/16] crypto: Add userspace report for aead type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 10/16] crypto: Add userspace report for givcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 09/16] crypto: Add userspace report for ablkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 08/16] crypto: Add userspace report for blkcipher type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 07/16] crypto: Add userspace report for ahash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 06/16] crypto: Add userspace report for shash type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 05/16] crypto: Add userspace report for larval type algorithms
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 02/16] crypto: Add a flag to identify crypto instances
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 04/16] crypto: Add a report function pointer to crypto_type
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 03/16] crypto: Add userspace configuration API
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 01/16] crypto: authenc - Don't multiply priorities
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 00/16] crypto user configuration api
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto, x86: assembler implementation of SHA1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell: fix possible invalid pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: picoxcell - convert to platform ID table
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] n2_crypto: Fix a get/put_cpu() imbalance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: Update sha_transform
- From: Joe Perches <joe@xxxxxxxxxxx>
- Cryptomgr race vs built-in aesni
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH] treewide: Update sha_transform
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] treewide: Update sha_transform
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] lib/sha1: remove memsets and allocate workspace on the stack
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: remove memsets and allocate workspace on the stack
- From: Mandeep Singh Baines <msb@xxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: remove memsets and allocate workspace on the stack
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: remove memsets and allocate workspace on the stack
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] lib/sha1: remove memsets and allocate workspace on the stack
- From: Mandeep Singh Baines <msb@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] n2_crypto: Fix a get/put_cpu() imbalance
- From: David Miller <davem@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: "Locktyukhin, Maxim" <maxim.locktyukhin@xxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Nicolas Pitre <nico@xxxxxxxxxxx>
- [PATCH] treewide: Remove direct uses of SHA_WORKSPACE_WORDS
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] treewide: Remove direct uses of SHA_WORKSPACE_WORDS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Joachim Eastwood <manabian@xxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Joachim Eastwood <manabian@xxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Joachim Eastwood <manabian@xxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Joachim Eastwood <manabian@xxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Joachim Eastwood <manabian@xxxxxxxxx>
- [PATCH] n2_crypto: Fix a get/put_cpu() imbalance
- From: Thomas Meyer <thomas@xxxxxxxx>
- [PATCH] lib/sha1: use the git implementation of SHA-1
- From: Mandeep Singh Baines <msb@xxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto, x86: assembler implementation of SHA1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto, sha1: export sha1_update for reuse
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v3 0/2] crypto, x86: assembler implementation of SHA1
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: padlock-aes - Make module loading even quieter when hardware is missing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: picoxcell: fix possible invalid pointer dereference
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: picoxcell - support for device tree matching
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: picoxcell - add connection ID to the clock name
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: picoxcell - convert to platform ID table
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto, sha1: export sha1_update for reuse
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto, sha1: export sha1_update for reuse
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: padlock-aes - Make module loading even quieter when hardware is missing
- From: Jonathan Nieder <jrnieder@xxxxxxxxx>
- Re: Bug#485070: cryptsetup: "FATAL" padlock_{aes,sha} error during boot
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: cryptsetup: "FATAL" padlock_{aes,sha} error during boot
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto, sha1: export sha1_update for reuse
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto, sha1: export sha1_update for reuse
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- cryptsetup: "FATAL" padlock_{aes,sha} error during boot
- From: Ralf Jung <ralfjung-e@xxxxxx>
- Re: [Bug 37862] padlock related kernel NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [Bugme-new] [Bug 37862] New: padlock related kernel NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [lm-sensors] [PATCH 01/34] System Firmware Interface
- From: Jean Delvare <khali@xxxxxxxxxxxx>
- [PATCH v2 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto, sha1: export sha1_update for reuse
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto, x86: assembler implementation of SHA1
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Crypto Update for 3.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 08/34] drivers/crypto changes for SMBIOS and System Firmware
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 01/34] System Firmware Interface
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 34/34] Remove old DMI & SMBIOS code and make SMBIOS default on
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 02/34] New SMBIOS driver for x86 and ia64.
- From: Prarit Bhargava <prarit@xxxxxxxxxx>
- [PATCH 2/2] crypto, x86: SSSE3 based SHA1 implementation for x86-64
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto, sha1: export sha1_update for reuse
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 0/2] crypto, x86: assembler implementation of SHA1
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 1/8] crypto: talitos - ensure request ordering within a single tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 7/8] crypto: caam - faster aead implementation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 8/8] crypto: caam - ablkcipher support
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 5/8] crypto: caam - shorter names
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 4/8] crypto: talitos - don't bad_key in ablkcipher setkey
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 6/8] crypto: caam - structure renaming
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 3/8] crypto: talitos - remove unused giv from ablkcipher methods
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/8] crypto: talitos - don't set done notification in hot path
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/8] crypto: talitos - ensure request ordering within a single tfm
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Announce loop-AES-v3.6d file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto, gf128: fix call to memset()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto, gf128: fix call to memset()
- From: pageexec@xxxxxxxxxxx
- Re: [PATCH] crypto, gf128: fix call to memset()
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto, gf128: fix call to memset()
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Fwd: crypto accelerator driver problems
- From: Hamid Nassiby <h.nassiby@xxxxxxxxx>
- Re: [PATCH] s390: support hardware accelerated SHA-224
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 3.0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix operator precedence in shared descriptor allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- Re: [PATCH] crypto: caam - fix operator precedence in shared descriptor allocation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] s390: support hardware accelerated SHA-224
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Don't use err uninitialized in algif_hash.c:hash_sendmsg()
- From: Jesper Juhl <jj@xxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: sha1: use SHA1_BLOCK_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - Perform read/modify/write on device control register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Don't use err uninitialized in algif_hash.c:hash_sendmsg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Don't use err uninitialized in algif_hash.c:hash_sendmsg()
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] Crypto: Don't use err uninitialized in algif_hash.c:hash_sendmsg()
- From: Jesper Juhl <jj@xxxxxxxxxxxxx>
- Re: [PATCH 00/35]: System Firmware and SMBIOS Support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3] crypto: sha1: use SHA1_BLOCK_SIZE
- From: Mandeep Singh Baines <msb@xxxxxxxxxx>
- Re: [PATCH] hwrng: ppc4xx - add support for ppc4xx TRNG
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH] hwrng: ppc4xx - add support for ppc4xx TRNG
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: crypto4xx - Perform read/modify/write on device control register
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- PROBLEM: padlock related kernel NULL pointer dereference
- From: "Jethro Beekman - E.T.S.V. Scintilla" <jethrob@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/5] clocksource: add support for entropy-generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 5/5] misc: add clocksource-based entropy generation driver
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] clocksource: add support for entropy-generation function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Matt Mackall <mpm@xxxxxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: john stultz <johnstul@xxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: [PATCH 4/5] tsc: wire up entropy generation function
- From: Venkatesh Pallipadi <venki@xxxxxxxxxx>
- [PATCH 2/5] clocksource: add support for entropy-generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH 4/5] tsc: wire up entropy generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH 1/5] random: add new clocksource entropy interface
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH 3/5] hpet: wire up entropy generation function
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH 5/5] misc: add clocksource-based entropy generation driver
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH 0/5] Feed entropy pool via high-resolution clocksources
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: HW Accelerated IPSEC?
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 00/11] crypto: omap-sham driver fixes
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto: picoxcell: fix possible invalid pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix build warning when DEBUG_FS not configured
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] crypto: omap-sham driver fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: UML build fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- HW Accelerated IPSEC?
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- [PATCH] crypto: picoxcell: fix possible invalid pointer dereference
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - fix build warning when DEBUG_FS not configured
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- [PATCH 05/11] omap-sham: move some flags to device context
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 02/11] omap-sham: remove unused code
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 01/11] omap-sham: remove extra reference
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 09/11] omap-sham: irq handler must not clear error code
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 11/11] omap-sham: do not schedule tasklet if there is no active requests
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 10/11] omap-sham: clear device flags when finishing request
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 07/11] omap-sham: remove dedicated queue handling tasklet
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 08/11] omap-sham: irq and dma handling changes
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 06/11] omap-sham: remove unnecessary local variable
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 03/11] omap-sham: replace flags bit mask with bit number
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 04/11] omap-sham: replace flags operation with atomic bit operations
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- [PATCH 00/11] crypto: omap-sham driver fixes
- From: Dmitry Kasatkin <dmitry.s.kasatkin@xxxxxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- [PATCH] crypto: UML build fixes
- From: Richard Weinberger <richard@xxxxxx>
- Re: loop-aes encrypted root on Fedora 15 using systemd
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] [crypto] testmgr: add xts-aes-256 self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sha1: modify sha1_update to use SHA1_BLOCK_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- loop-aes encrypted root on Fedora 15 using systemd
- From: Frederick Gazerblezeebe <fgazerblezeebe@xxxxxxxxx>
- [PATCH v2] [crypto] testmgr: add xts-aes-256 self-test
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH v2] crypto: sha1: modify sha1_update to use SHA1_BLOCK_SIZE
- From: Mandeep Singh Baines <msb@xxxxxxxxxxxx>
- Re: [PATCH] crypto: sha1: modify sha1_update to use SHA1_BLOCK_SIZE
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] crypto: sha1: modify sha1_update to use SHA1_BLOCK_SIZE
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix operator precedence in shared descriptor allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/8] x86: Fix set but not used in ghash_async_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sha1: modify sha1_update to use SHA1_BLOCK_SIZE
- From: Mandeep Singh Baines <msb@xxxxxxxxxxxx>
- Re: [PATCH] crypto/testmgr: add xts-aes-256 self-test
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH] crypto/testmgr: add xts-aes-256 self-test
- From: Jarod Wilson <jarod@xxxxxxxxxx>
- [PATCH] crypto: caam - fix operator precedence in shared descriptor allocation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Crypto Update for 2.6.40
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] x86: Fix set but not used in ghash_async_setkey()
- From: "Gustavo F. Padovan" <padovan@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - platform_bus_type migration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: fix aesni build on i386
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH -next] crypto: fix aesni build on i386
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: [PATCH] aesni-intel: Merge with fpu.ko
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam - add support for sha512 variants of existing AEAD algorithms
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - remove unused authkeylen from caam_ctx
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam - fix decryption shared vs. non-shared key setting
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - platform_bus_type migration
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: mv_cesa - use ablkcipher_request_cast instead of the manual container_of
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] aesni-intel: Merge with fpu.ko
- From: Andy Lutomirski <luto@xxxxxxx>
- Re: aesni-intel as module = cryptsetup failure
- From: Milan Broz <mbroz@xxxxxxxxxx>
- aesni-intel as module = cryptsetup failure
- From: Andrew Lutomirski <luto@xxxxxxx>
- [PATCH 06/10] mv_cesa: refactor copy_src_to_buf()
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 04/10] mv_cesa: print a warning when registration of AES algos fail
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 07/10] mv_cesa: fill inner/outer IV fields only in HMAC case
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 08/10] mv_cesa: move digest state initialisation to a better place
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 02/10] mv_cesa: the descriptor pointer register needs to be set just once
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 10/10] mv_cesa: make count_sgs() null-pointer proof
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 01/10] mv_cesa: use ablkcipher_request_cast instead of the manual container_of
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 03/10] mv_cesa: drop this call to mv_hash_final from mv_hash_finup
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 09/10] mv_cesa: copy remaining bytes to SRAM only when needed
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- [PATCH 05/10] mv_cesa: no need to save digest state after the last chunk
- From: Phil Sutter <phil.sutter@xxxxxxxxxxxx>
- Re: blowfish from openSSL to kernel cryptoAPI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - fix printk recursion for long error texts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: testmgr: add support for aes ofb mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: blowfish from openSSL to kernel cryptoAPI
- From: Tzvi Chumash <tzvi@xxxxxxxxxxxxxxxx>
- Re: blowfish from openSSL to kernel cryptoAPI
- From: Emanuele Cesena <emanuele.cesena@xxxxxxxxx>
- Re: blowfish from openSSL to kernel cryptoAPI
- From: Tzvi Chumash <tzvi@xxxxxxxxxxxxxxxx>
- Re: blowfish from openSSL to kernel cryptoAPI
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - handle interrupt lines shared across rings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: caam - fix printk recursion for long error texts
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam - remove unused keylen from session context
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - handle interrupt lines shared across rings
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- blowfish from openSSL to kernel cryptoAPI
- From: Tzvi Chumash <tzvi@xxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.6c file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- Re: shash_alg size fields and stomping memory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: testmgr: add support for aes ofb mode
- Re: [PATCH 0/4] crypto: omap-sham driver fixes
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v2] crypto: testmgr: add support for aes ofb mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: omap-sham driver fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: testmgr: add support for aes ofb mode
- [PATCH] crypto: testmgr: add support for aes ofb mode
- Re: [PATCH] s390: add fallback for unsupported XTS-384 mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] s390: add fallback for unsupported XTS-384 mode
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/8] tcrypt: disable 384 bit key XTS test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/8] tcrypt: disable 384 bit key XTS test
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: omap-sham - fix concurrent sha1 calculations
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 2/4] crypto: omap-sham - remove debug print
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 4/4] crypto: omap-sham - hmac calculation bug fix for sha1 base hash
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 3/4] crypto: omap-sham - enable driver for EMU chips
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 0/4] crypto: omap-sham driver fixes
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 7/8] tcrypt: disable 384 bit key XTS test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 8/8] tcrypt: CTR mode speed test for AES
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 3/8] s390: add System z hardware support for XTS mode
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 4/8] s390: add System z hardware support for CTR mode
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 7/8] tcrypt: disable 384 bit key XTS test
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 6/8] s390: cleanup s390 Kconfig options
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 5/8] s390: add System z hardware support for GHASH
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 1/8] s390: extend crypto facility check
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 0/8] (3rd take) add support for z196 CPACF algorithms
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 2/8] s390: cleanup DES code
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 1/1] s390: extend crypto facility check
- From: jang@xxxxxxxxxxxxxxxxxx
- [PATCH 0/1] add support for z196 CPACF algorithms
- From: jang@xxxxxxxxxxxxxxxxxx
- shash_alg size fields and stomping memory
- From: Kent Borg <kentborg@xxxxxxxx>
- Re: [PATCH 1/8] s390:
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] s390:
- From: Jan Glauber <jang@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - handle interrupt lines shared across rings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: aead: driver side documentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - remove WAIT-FOR-COMPLETIONs from givencrypt descriptor
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: caam - remove duplicate dev_err
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam - fix queue interface detection
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam - handle interrupt lines shared across rings
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: aead: driver side documentation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: blowfish: Fixed a multi line macro issue
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: blowfish: Fixed a multi line macro issue
- From: Aditya Shevade <aditya.shevade@xxxxxxxxx>
- Re: [PATCH] crypto: blowfish: Fixed a multi line macro issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] drivers/crypto/caam/caamalg.c: introduce missing kfree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add S5PV210 advanced crypto engine support.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: aead: driver side documentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: blkcipher: Fixed some whitespace style issues
- From: Aditya Shevade <aditya.shevade@xxxxxxxxx>
- [PATCH] crypto: blowfish: Fixed a multi line macro issue
- From: Aditya Shevade <aditya.shevade@xxxxxxxxx>
- Re: aead: driver side documentation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: aead: driver side documentation
- From: Phil Sutter <phil@xxxxxx>
- Re: aead: driver side documentation
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- aead: driver side documentation
- From: Phil Sutter <phil@xxxxxx>
- [ANN] Linux Security Summit 2011 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: markus reichelt <ml@xxxxxxxxxxxxxx>
- [PATCH] crypto: add S5PV210 advanced crypto engine support.
- From: Vladimir Zapolskiy <vzapolskiy@xxxxxxxxx>
- Re: crypto_alg and alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] drivers/crypto/caam/caamalg.c: introduce missing kfree
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/6] drivers/crypto/caam/caamalg.c: introduce missing kfree
- From: Julia Lawall <julia@xxxxxxx>
- crypto_alg and alignment
- From: Vladimir Zapolskiy <vzapolskiy@xxxxxxxxx>
- Re: loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: Thomas Siedlich <thomas.siedlich@xxxxxxxxx>
- Re: loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: Thomas Siedlich <thomas.siedlich@xxxxxxxxx>
- Crypto Fixes for 2.6.39
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- loop-aes: It is not longer possible to create a filesystem on an encrypted DVD-RAM
- From: Thomas Siedlich <thomas.siedlich@xxxxxxxxx>
- Re: [PATCH] picoxcell-crypto: fix possible status FIFO overflow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: padlock - Add SHA-1/256 module for VIA Nano
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- cryptodev rebased
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] RFC4106 AES-GCM Driver - fixed problem with packets that are not multiple of 64bytes
- From: "Struk, Tadeusz" <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] RFC4106 AES-GCM Driver - fixed problem with packets that are not multiple of 64bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] RFC4106 AES-GCM Driver - fixed problem with packets that are not multiple of 64bytes
- From: "Struk, Tadeusz" <tadeusz.struk@xxxxxxxxx>
- RE: [PATCH] crypto: padlock - Add SHA-1/256 module for VIA Nano
- From: <BrillyWu@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: padlock - Add SHA-1/256 module for VIA Nano
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] picoxcell-crypto: fix possible status FIFO overflow
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - de-CHIP-ify device tree compatibles
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: caam - ARRAY_SIZE() vs sizeof()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: caam - dereferencing ERR_PTR on allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - standardize device tree naming convention to utilize '-vX.Y'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RSA signature verification
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto: padlock - Add SHA-1/256 module for VIA Nano
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RSA signature verification
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RSA signature verification
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH] crypto: padlock - Add SHA-1/256 module for VIA Nano
- From: <BrillyWu@xxxxxxxxxxxxxx>
- Re: RSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RSA signature verification
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto: caam - de-CHIP-ify device tree compatibles
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [patch] crypto: caam - dereferencing ERR_PTR on allocation failure
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [patch] crypto: caam - ARRAY_SIZE() vs sizeof()
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - de-CHIP-ify device tree compatibles
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Crypto Update for 2.6.39
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [patch] crypto: caam - ARRAY_SIZE() vs sizeof()
- From: Dan Carpenter <error27@xxxxxxxxx>
- [patch] crypto: caam - dereferencing ERR_PTR on allocation failure
- From: Dan Carpenter <error27@xxxxxxxxx>
- [PATCH] crypto: caam - standardize device tree naming convention to utilize '-vX.Y'
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 1/9] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC v2 PATCH 1/9] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 1/9] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] RFC4106 AES-GCM Driver - fixed problem with packets that are not multiple of 64bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add support for the Freescale SEC4/CAAM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/9] xfrm: Add basic infrastructure to support IPsec extended sequence numbers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/9] xfrm: Add basic infrastructure to support IPsec extended sequence numbers
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 2/9] xfrm: Add basic infrastructure to support IPsec extended sequence numbers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 PATCH 1/9] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Add struct crypto_alg->cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: Add struct crypto_alg->cra_check_optimized
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto/crc32c: Add crc32c_cra_check_optimized for crc32c_intel
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: add header files for the Freescale SEC4/CAAM
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: add support for the Freescale SEC4/CAAM
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: add device tree bindings for the Freescale SEC4/CAAM
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 0/3] crypto: add support for the Freescale SEC4/CAAM
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] RFC4106 AES-GCM Driver - fixed problem with packets that are not multiple of 64bytes
- From: tadeusz.struk@xxxxxxxxx
- [RFC PATCH] iproute2: Add IPsec extended sequence number support
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 9/9] xfrm: Add user interface for esn and big anti-replay windows
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 8/9] xfrm: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 7/9] xfrm: Support anti-replay window size bigger than 32 packets
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 6/9] xfrm: Move IPsec replay detection functions to a separate file
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 5/9] esp6: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 4/9] esp4: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 3/9] xfrm: Use separate low and high order bits of the sequence numbers in xfrm_skb_cb
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 2/9] xfrm: Add basic infrastructure to support IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 1/9] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC v2 PATCH 0/9] Add IPsec extended (64-bit) sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] [PATCH 06/11] esp4: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not attempt to write to readonly variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [RFC 12/12] iscsi-target: Add Makefile/Kconfig and update TCM top level
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]