Linux Crypto
[Prev Page][Next Page]
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: linux-next: Tree for November 29
- From: Zimny Lech <napohybelskurwysynom2010@xxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for November 29 (aesni-intel)
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: linux-next: Tree for November 29
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: linux-next: Tree for November 29
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni-intel - Fixed build error on x86-32
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.5 0/5] keys: trusted and encrypted keys
- From: James Morris <jmorris@xxxxxxxxx>
- question about OCF and crypto API
- From: Kevin Wilson <wkevils@xxxxxxxxx>
- [PATCH v2] crypto: aesni-intel - Fixed build error on x86-32
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] crypto: aesni-intel - Fixed build error on x86-32
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- crypto: algif_skcipher - Pass on error from af_alg_make_sg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] omap-sham: OMAP SHA1/MD5 driver fixes and improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] x86, crypto: ported aes-ni implementation to x86
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Makefile: Makefile clean up
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/49] crypto: Use vzalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] net - Add AF_ALG macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pcrypt - Fix use after free on padata_free
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] crypto: pcrypt - Fix use after free on padata_free
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: pcrypt - Fix use after free on padata_free
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 5/5] Audit type-specific crypto operations
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 4/5] Audit type-independent events
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 2/5] Add unique IDs to AF_ALG sockets
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 3/5] Add "alg_name" operation to af_alg_type.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 1/5] Add general crypto auditing infrastructure
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 0/5] RFC v2: AF_ALG auditing
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- Re: [PATCH v1.5 3/5] key: add tpm_send command
- From: David Safford <safford@xxxxxxxxxxxxxx>
- [PATCH v1.5 5/5] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.5 3/5] key: add tpm_send command
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- Re: [PATCH v1.5 3/5] key: add tpm_send command
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.5 3/5] key: add tpm_send command
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- Re: [PATCH v1.5 2/5] tpm: add module_put wrapper
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- [PATCH v1.5 3/5] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.5 1/5] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.5 4/5] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.5 0/5] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.5 2/5] tpm: add module_put wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] Add general crypto auditing infrastructure
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/5] Add general crypto auditing infrastructure
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 1/5] Add general crypto auditing infrastructure
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: crypto_shash_digest API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- crypto_shash_digest API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] Audit type-specific crypto operations
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 4/5] Audit type-independent events
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 1/5] Add general crypto auditing infrastructure
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 3/5] Add "alg_name" operation to af_alg_type.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 2/5] Add unique IDs to AF_ALG sockets
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- RFC: AF_ALG auditing
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH v1.4 5/5] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC] [PATCH] iproute2: Add IPsec extended sequence number support
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 11/11] xfrm: Add user interface for esn and big anti-replay windows
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 10/11] xfrm: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 09/11] xfrm: Support anti-replay window size bigger than 32 packets
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 08/11] xfrm: Move IPsec replay detection functions to a separate file
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 07/11] esp6: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 06/11] esp4: Add support for IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 05/11] xfrm: Use separate low and high order bits of the sequence numbers in xfrm_skb_cb
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 04/11] xfrm: Add basic infrastructure to support IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 03/11] crypto: authencesn - Add algorithm to handle IPsec extended sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 02/11] crypto: Use scatterwalk_crypto_chain
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 01/11] crypto: scatterwalk - Add scatterwalk_crypto_chain helper
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [RFC] [PATCH 0/11] Add IPsec extended (64-bit) sequence numbers
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v1.4 4/5] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.4 3/5] key: add tpm_send command
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.4 5/5] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.4 4/5] keys: add new trusted key-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.4 3/5] key: add tpm_send command
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.4 3/5] key: add tpm_send command
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.4 2/5] tpm: add module_put wrapper
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.4 1/5] lib: hex2bin converts ascii hexadecimal string to binary
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3 5/8] omap-sham: crypto_ahash_final() now not need to be called.
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 7/8] omap-sham: FLAGS_FIRST is redundant and removed
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 1/8] omap-sham: uses digest buffer in request context
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 6/8] omap-sham: hash-in-progress is stored in hw format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 8/8] omap-sham: zero-copy scatterlist handling
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 0/8] omap-sham: OMAP SHA1/MD5 driver fixes and improvements
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 3/8] omap-sham: error handling improved
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 4/8] omap-sham: removed redundunt locking
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 2/8] omap-sham: DMA initialization fixes for off mode
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] net - Add AF_ALG macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 3/5] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 1/5] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 5/5] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 4/5] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 2/5] tpm: add module_put wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.4 0/5] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: "Struk, Tadeusz" <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] x86, crypto: ported aes-ni implementation to x86
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v4] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Checkpatch complaining about spaces around * used as arithmetic operator
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: Rajiv Andrade <srajiv@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: updates omap sham device related platform code
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] omap-sham: OMAP macros corrected
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: updates omap sham device related platform code
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 1/5] crypto: omap-aes: change in prevention of OCP bus error
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] net - Add AF_ALG macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 2.6.37
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: Rajiv Andrade <srajiv@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Dan Rosenberg <drosenberg@xxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v1.3 3/4] keys: add new trusted key-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 3/4] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Dan Rosenberg <drosenberg@xxxxxxxxxxxxx>
- Re: [CRYPTO] obfuscating kernel pointers
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH v1.3 3/4] keys: add new trusted key-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: David Howells <dhowells@xxxxxxxxxx>
- [CRYPTO] obfuscating kernel pointers
- From: Dan Rosenberg <drosenberg@xxxxxxxxxxxxx>
- Re: [PATCH v1.3 3/4] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: crypto ahash error handling
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: crypto ahash error handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.3 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v1.3 3/4] keys: add new trusted key-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1.3 2/4] key: add tpm_send command
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: crypto ahash error handling
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: crypto ahash error handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] omap-aes: DMA initialization fixes for OMAP off mode
- From: Felipe Balbi <me@xxxxxxxxxxxxxxx>
- Re: Linux 2.6.37-rc1 (pcrypt fault)
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- [PATCH 2/4] omap-sham: DMA initialization fixes for off mode
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 3/4] omap-sham: error handling improved
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 4/4] omap-sham: removed redundunt locking
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 1/4] omap-sham: uses digest buffer in request context
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 0/4]v2 omap-sham off mode and error handling fixes.
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 7/7] omap-sham: removed redundunt locking
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 5/7] omap-sham: DMA initialization fixes for off mode
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 6/7] omap-sham: error handling improved
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 4/7] omap-sham: uses digest buffer in request context
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 3/7] omap-sham: OMAP macros corrected
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 2/7] crypto: omap-sham - omap sha1 & md5 driver
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 1/7] crypto: updates omap sham device related platform code
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 0/7] omap-sham off mode and error handling fixes.
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 5/5] omap-aes: unnecessary code removed
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 4/5] omap-aes: error handling implementation improved
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 3/5] omap-aes: redundant locking is removed
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 2/5] omap-aes: DMA initialization fixes for OMAP off mode
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 1/5] crypto: omap-aes: change in prevention of OCP bus error
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 0/5] omap-aes off mode and error handling fixes
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v1.3 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.3 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.3 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.3 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.3 0/4] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: crypto ahash error handling
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: crypto ahash error handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Linux 2.6.37-rc1 (pcrypt fault)
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: David Safford <safford@xxxxxxxxxxxxxx>
- Re: [PATCH v1.2 3/4] keys: add new trusted key-type
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v1.2 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.2 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.2 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.2 0/4] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.2 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- crypto ahash error handling
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] Crypto: Makefile: Makefile clean up
- From: Tracey Dent <tdent48227@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- RE: [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: "Allyn, Mark A" <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- [PATCH 1/1] crypto: api.c: doc on crypto_alg_lookup, crypto_larval_lookup, and crypto_alg_mod_lookup
- From: Mark Allyn <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH] crypto: padlock: fix for non-64byte aligned data
- From: Phil Sutter <phil@xxxxxx>
- [PATCH 06/49] crypto: Use vzalloc
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: add comments to crypto_alg_lookup and crypto_alg_larval_lookup
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- [PATCH 1/1] crypto: api.c: add comments to crypto_alg_lookup and crypto_alg_larval_lookup
- From: Mark Allyn <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] net - Add AF_ALG macros
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cast5: simplify if-statements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: padlock: fix for non-64byte aligned data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: padlock: fix for non-64byte aligned data
- From: Phil Sutter <phil@xxxxxx>
- [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] net - Add AF_ALG macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c adding kernel-doc comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- RE: [PATCH 1/1] crypto: api.c adding kernel-doc comments
- From: "Allyn, Mark A" <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c adding kernel-doc comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- [PATCH 1/1] crypto: api.c adding kernel-doc comments
- From: Mark Allyn <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: adding doxygen comments to api
- From: David Daney <ddaney@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: api.c: adding doxygen comments to api
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- [PATCH 1/1] crypto: api.c: adding doxygen comments to api
- From: Mark Allyn <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH] crypto: cast5: simplify if-statements
- From: Nicolas Kaiser <nikai@xxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH v3] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: How do you specify driver in tcrypt
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: alg_test question
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- How do you specify driver in tcrypt
- From: Mark Allyn <allyn@xxxxxxxx>
- alg_test question
- From: Mark Allyn <allyn@xxxxxxxx>
- Re: [PATCH v1.1 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.1 4/4] keys: add new key-type encrypted
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] x86, crypto: ported aes-ni implementation to x86
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH 3/3] Extending the RC4106 AES-GCM test vectors
- From: tadeusz.struk@xxxxxxxxx
- [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: tadeusz.struk@xxxxxxxxx
- Re: Question on structures
- From: Mark Allyn <allyn@xxxxxxxx>
- [PATCH] crypto: cast5: simplify if-statements
- From: Nicolas Kaiser <nikai@xxxxxxxxx>
- Re: AES-NI for x86?
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: AES-NI for x86?
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: Question on structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: General questions on crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Questions about ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Questions about ahash
- From: Mark Allyn <allyn@xxxxxxxx>
- General questions on crypto
- From: Mark Allyn <allyn@xxxxxxxx>
- Re: AES-NI for x86?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Question on structures
- From: Mark Allyn <allyn@xxxxxxxx>
- Re: Questions about ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto: dubious error check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- AES-NI for x86?
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto: dubious error check
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] drivers/crypto: dubious error check
- From: Nicolas Kaiser <nikai@xxxxxxxxx>
- Crypto Update for 2.6.37
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Questions about ahash
- From: "Allyn, Mark A" <mark.a.allyn@xxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: "Hoban, Adrian" <adrian.hoban@xxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 1/4] net - Add AF_ALG macros
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: af_alg - User-space interface for Crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - User-space interface for skcipher operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_hash - User-space interface for hash operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] net - Add AF_ALG macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2.6.36-rc7] crypto: use cancel_delayed_work_sync() in hifn_795x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2.6.36-rc7] crypto: use cancel_delayed_work_sync() in hifn_795x
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v1.1 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] Extending the RC4106 AES-GCM test vectors
- From: tadeusz.struk@xxxxxxxxx
- [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: tadeusz.struk@xxxxxxxxx
- Re: [PATCH 1/3] Adding the AEAD interface type support to cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1.1 3/4] keys: add new trusted key-type
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v1.1 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.1 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.1 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.1 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1.1 0/4] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] Extending the RC4106 AES-GCM test vectors
- From: tadeusz.struk@xxxxxxxxx
- [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: tadeusz.struk@xxxxxxxxx
- [PATCH 1/3] Adding the AEAD interface type support to cryptd
- From: tadeusz.struk@xxxxxxxxx
- Re: crypto: return codes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: crypto: return codes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: crypto: return codes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] keys: added cleanup code for trusted and encrypted key types
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] keys: added cleanup code for trusted and encrypted key types
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] keys: fixed handling of update method of the encrypted key type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/4] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] keys: added cleanup code for trusted and encrypted key types
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [PATCH 1/2] keys: fixed handling of update method of the encrypted key type
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [PATCH 0/2] trusted and encrypted keys bug fixes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- crypto: return codes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Tirumala Marri <tmarri@xxxxxxx>
- Re: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Greg KH <greg@xxxxxxxxx>
- RE: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Tirumala Marri <tmarri@xxxxxxx>
- Re: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Tirumala Marri <tmarri@xxxxxxx>
- RE: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Tirumala Marri <tmarri@xxxxxxx>
- Re: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] PPC4xx: ADMA separating SoC specific functions
- From: Wolfgang Denk <wd@xxxxxxx>
- Re: [RFC][PATCH 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/4] keys: add new key-type encrypted
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- Re: [RFC][PATCH 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/4] keys: add new key-type encrypted
- From: Roberto Sassu <roberto.sassu@xxxxxxxxx>
- [RFC][PATCH 4/4] keys: add new key-type encrypted
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 3/4] keys: add new trusted key-type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 2/4] key: add tpm_send command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 0/4] keys: trusted and encrypted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 1/4] lib: hex2bin converts ascii hexadecimal string to binary
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Tirumala Marri <tmarri@xxxxxxx>
- RE: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: "Paoloni, Gabriele" <gabriele.paoloni@xxxxxxxxx>
- Re: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Stefan Roese <sr@xxxxxxx>
- Re: [PATCH v1 1/4] PPC4xx: Generalizing ADMA driver modifications
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v1 3/4] PPC4xx: New file with SoC specific functions
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Tirumala Marri <tmarri@xxxxxxx>
- RE: [PATCH v1 1/4] PPC4xx: Generalizing ADMA driver modifications
- From: Tirumala Marri <tmarri@xxxxxxx>
- Re: [PATCH v1 1/4] PPC4xx: Generalizing ADMA driver modifications
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v1 2/4] PPC4xx: New header with SoC specific dfinitions
- [PATCH v1 4/4] PPC4xx: Merge files to create single 440spe header
- [PATCH v1 3/4] PPC4xx: New file with SoC specific functions
- Re: [PATCH 2/2] PPC4xx: Merge xor.h and dma.h into onefile ppc440spe-dma.h
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: talitos - fix warning: 'alg' may be used uninitialized in this function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Wolfgang Denk <wd@xxxxxxx>
- RE: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Tirumala Marri <tmarri@xxxxxxx>
- RE: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: "Struk, Tadeusz" <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] PPC4xx: Merge xor.h and dma.h into onefile ppc440spe-dma.h
- From: Wolfgang Denk <wd@xxxxxxx>
- Re: [PATCH 1/2] PPC4xx: Generelizing drivers/dma/ppc4xx/adma.c
- From: Wolfgang Denk <wd@xxxxxxx>
- [PATCH 2/2] PPC4xx: Merge xor.h and dma.h into onefile ppc440spe-dma.h
- [PATCH 3/3] crypto: talitos - sparse check endian fixes
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: talitos - fix warning: 'alg' may be used uninitialized in this function
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: talitos - fix checkpatch warning
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code
- From: Jeff Layton <jlayton@xxxxxxxxx>
- Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code
- From: Jeff Layton <jlayton@xxxxxxxxx>
- Re: [PATCH -v2 1/6] functions to either extract or create av_ pair/ti_info blob
- From: Jeff Layton <jlayton@xxxxxxxxx>
- Re: [PATCH]crypto/Kconfig update broken web addresses.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] crypto: Niagara2 driver needs to depend upon CRYPTO_DES.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH]crypto/Kconfig update broken web addresses.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] Adding the AEAD interface type support to cryptd
- From: "Hoban, Adrian" <adrian.hoban@xxxxxxxxx>
- [PATCH 2/3] RFC4106 AES-GCM Driver Using Intel New Instructions
- From: "Hoban, Adrian" <adrian.hoban@xxxxxxxxx>
- [PATCH 0/3] Optimized RFC4106 AES-GCM implementation using Intel New Instructions
- From: "Hoban, Adrian" <adrian.hoban@xxxxxxxxx>
- [PATCH 3/3] Extending the RC4106 AES-GCM test vectors
- From: "Hoban, Adrian" <adrian.hoban@xxxxxxxxx>
- [PATCH] crypto: Niagara2 driver needs to depend upon CRYPTO_DES.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH -v2 6/6] convert signature calculations to use crypto apis
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH -v2 5/6] convert hash calculations to use crypto apis
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH -v2 4/6] generate secondary session key and ciphertext and send it if signing enabled
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH -v2 3/6] define, declare, and use crypto hash functions
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH -v2 1/6] functions to either extract or create av_ pair/ti_info blob
- From: shirishpargaonkar@xxxxxxxxx
- Re: [PATCH 4/8] ntlmv2/ntlmssp define, declare, and use crypto hash functions
- From: Suresh Jayaraman <sjayaraman@xxxxxxx>
- Re: [PATCH 4/8] ntlmv2/ntlmssp define, declare, and use crypto hash functions
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH 7/8 Rev2] ntlmv2/ntlmssp generate secondary session key and ciphertext and send it if signing enabled
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH 7/8 Rev2] ntlmv2/ntlmssp generate secondary session key and ciphertext and send it if signing enabled
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- [PATCH 7/8 Rev2] ntlmv2/ntlmssp generate secondary session key and ciphertext and send it if signing enabled
- From: shirishpargaonkar@xxxxxxxxx
- Re: RFC: Crypto API User-interface
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: RFC: Crypto API User-interface
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- RFC: Crypto API User-interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH]crypto/Kconfig update broken web addresses.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: crypto_xor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: updates to enable omap aes
- From: Tobias Karnat <tobias.karnat@xxxxxxxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Chuck Ebbert <cebbert@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: omap-sham: Adjust DMA parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: FIPS requires algorithm self-tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] omap-aes: OMAP2/3 AES HW accelerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 2.6.36
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: omap-sham: Adjust DMA parameters
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 0/1] omap-sham: use prefetch mechanism to increase transfer speed
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- crypto_xor
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: updates to enable omap aes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: omap-aes: OMAP2/3 AES hw accelerator driver
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: updates to enable omap aes
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH] crypto: Fix spelling error in crypto/Kconfig
- From: Bart Van Assche <bvanassche@xxxxxxx>
- [PATCH] crypto: FIPS requires algorithm self-tests
- From: Chuck Ebbert <cebbert@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Pavel Machek <pavel@xxxxxx>
- [linux-cifs-client][PATCH][Try 2] Eliminate sparse warning - bad constant expression
- From: shirishpargaonkar@xxxxxxxxx
- [linux-cifs-client][PATCH] Eliminate sparse warning - bad constant expression
- From: shirishpargaonkar@xxxxxxxxx
- Re: crypto apis in cifs module allocating storage for character array during run-time vs. dynamic allocation
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: crypto apis in cifs module allocating storage for character array during run-time vs. dynamic allocation
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- crypto apis in cifs module allocating storage for character array during run-time vs. dynamic allocation
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs
- From: Jeff Layton <jlayton@xxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs
- From: Jeff Layton <jlayton@xxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 06/19] Add ioctl() argument and attribute handling utils
- From: Stefan Richter <stefanr@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/19] Add ioctl() argument and attribute handling utils
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: "Ted Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@xxxxxxxxx>
- Re: [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: "Ted Ts'o" <tytso@xxxxxxx>
- [PATCH 0/2] omap-aes: OMAP2/3 AES HW accelerator driver
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 2/2] crypto: omap-aes: OMAP2/3 AES hw accelerator driver
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH 1/2] crypto: updates to enable omap aes
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 06/19] Add ioctl() argument and attribute handling utils
- From: Stefan Richter <stefanr@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/19] User-space API definition
- From: Stefan Richter <stefanr@xxxxxxxxxxxxxxxxx>
- [PATCH 03/19] Add libtommath headers
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 11/19] Add algorithm properties table.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 13/19] Add /dev/crypto auditing infrastructure
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 12/19] Add DH implementation and pubkey abstraction layer
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 14/19] Add most operations on key objects.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 15/19] Add key wrapping operations
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 16/19] Add helpers for zero-copy userspace access
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 17/19] Add session operations
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 06/19] Add ioctl() argument and attribute handling utils
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 07/19] Add crypto API utilities.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 08/19] Add per-process and per-user limits
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 18/19] Add ioctl handlers
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 19/19] Finally, add the /dev/crypto device.
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 04/19] Add libtomcrypt headers
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 05/19] Add internal /dev/crypto implementation headers
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 02/19] Add CRYPTO_USERSPACE config option
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 01/19] User-space API definition
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 00/19] RFC, v2: "New" /dev/crypto user-space interface
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] Add maintainer entries for padata/pcrypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Maurus Cuelenaere <mcuelenaere@xxxxxxxxx>
- Re: [PATCH] crypto/Kconfig: fix typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Maurus Cuelenaere <mcuelenaere@xxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- [PATCH] crypto/Kconfig: fix typo
- From: Andy Isaacson <adi@xxxxxxxxxxxxx>
- [PATCH] Add maintainer entries for padata/pcrypt
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 2/4] /dev/crypto implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Linus Walleij <linus.walleij@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- RE: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: "Loc Ho" <lho@xxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: "Loc Ho" <lho@xxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: n2 RNG driver bogus cast removal
- From: Vasiliy Kulikov <segooon@xxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: n2 RNG driver bogus cast removal
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- n2 RNG driver bogus cast removal
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmac <mitr@xxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Evgeniy Polyakov <zbr@xxxxxxxxxxx>
- Re: [PATCH] Trivial. Fix typo in kconfig entry.
- From: Alejandro Riveira Fernández <ariveira@xxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Olivier Galibert <galibert@xxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Kyle Moffett <kyle@xxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Trivial. Fix typo in kconfig entry.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Initcall ordering problem (TTY vs modprobe vs MD5) and cryptomgr problem
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH 1/4] User-space API definition
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 3/4] Auditing infrastructure
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH 0/4] RFC: "New" /dev/crypto user-space interface
- From: Miloslav Trmač <mitr@xxxxxxxxxx>
- [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: Szilveszter Ördög <slipszi@xxxxxxxxx>
- [PATCH] Trivial. Fix typo in kconfig entry.
- From: Alejandro Riveira Fernández <ariveira@xxxxxxxxx>
- Re: [PATCH] Documentation/padata.txt: fix typos etc.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [linux-smb2-client][patch] Make NTLMv2 as auth mech within NTLMSSP and enable signing using crypto shash APIs
- From: shirishpargaonkar@xxxxxxxxx
- [PATCH] Documentation/padata.txt: fix typos etc.
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs
- From: shirishpargaonkar@xxxxxxxxx
- Re: [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: David Miller <davem@xxxxxxxxxxxxx>
- Crypto Update for 2.6.36
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] padata: update API documentation
- From: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
- Re: [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Kyungmin Park <kmpark@xxxxxxxxxxxxx>
- [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: Szilveszter Ördög <slipszi@xxxxxxxxx>
- Re: [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [linux-cifs-client][PATCH] (resend) Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: shirishpargaonkar@xxxxxxxxx
- [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs
- From: shirishpargaonkar@xxxxxxxxx
- Re: [PATCH 0/7] padata/pcrypt: cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] padata: update API documentation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 6/7] padata: Remove padata_get_cpumask
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 5/7] crypto: pcrypt - Update pcrypt cpumask according to the padata cpumask notifier
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 4/7] crypto: pcrypt - Rename pcrypt_instance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 3/7] padata: Pass the padata cpumasks to the cpumask_change_notifier chain
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 2/7] padata: Rearrange set_cpumask functions
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 1/7] padata: Rename padata_alloc functions
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 0/7] padata/pcrypt: cleanups
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/4] padata/pcrypt: fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] Adding ADMA support for PPC460EX DMA engine.
- From: Tirumala Marri <tmarri@xxxxxxx>
- Re: [PATCH] Adding ADMA support for PPC460EX DMA engine.
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Adding ADMA support for PPC460EX DMA engine.
- From: Stefan Roese <sr@xxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- using hmac-sha256 to generate smb2 signagures and oopsing
- From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
- [PATCH 4/4] crypto: pcrypt - Dont calulate a callback cpu on empty callback cpumask
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 3/4] padata: Check for valid cpumasks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 2/4] padata: Allocate cpumask dependend recources in any case
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 1/4] padata: Fix cpu index counting
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 0/4] padata/pcrypt: fixes
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/3] padata: cpumasks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] padata: cpumasks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - fix bug in sg_copy_end_to_buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/25] crypto: Convert pci_table entries to PCI_VDEVICE (if PCI_ANY_ID is used)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] padata: cpumasks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto/ablkcipher: missing return statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto/ablkcipher: missing return statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto/ablkcipher: missing return statement
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 16/25] crypto: Convert pci_table entries to PCI_VDEVICE (if PCI_ANY_ID is used)
- From: Peter Huewe <PeterHuewe@xxxxxx>
- [patch] crypto/ablkcipher: missing return statement
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [PATCH v3]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 0/6] padata: updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] Added sysfs interface to pcrypt.
- From: Dan Kruchinin <dkruchinin@xxxxxxx>
- [PATCH 2/3] Added sysfs primitives to padata subsystem
- From: Dan Kruchinin <dkruchinin@xxxxxxx>
- [PATCH 1/3] The aim of this patch is to make two separate cpumasks
- From: Dan Kruchinin <dkruchinin@xxxxxxx>
- [PATCH 0/3] padata: cpumasks
- From: Dan Kruchinin <dkruchinin@xxxxxxx>
- Re: [PATCH v2 2/2] Crypto: Talitos: Support for Async_tx XOR offload
- From: hank peng <pengxihan@xxxxxxxxx>
- [PATCH v2] crypto: talitos - fix bug in sg_copy_end_to_buffer
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix bug in sg_copy_end_to_buffer
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- [PATCH] crypto: talitos - fix bug in sg_copy_end_to_buffer
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- [PATCH 6/6] padata: update documentation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 5/6] padata: simplify serialization mechanism
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 4/6] padata: make padata_do_parallel to return zero on success
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 3/6] padata: Handle empty padata cpumasks
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 2/6] padata: Block until the instance is unused on stop
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 1/6] padata: Check for valid padata instance on start
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH 0/6] padata: updates
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v3]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: Evgeniy Polyakov <zbr@xxxxxxxxxxx>
- Re: [PATCH v3]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH v3]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH v2]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: Kim Phillips <kim.phillips@xxxxxxxxxxxxx>
- Re: [PATCH]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH v2]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH]crypto:hifn_795x.c Fix warning: variable 'ctx' set but not used
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Maurus Cuelenaere <mcuelenaere@xxxxxxxxx>
- Re: [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Crypto API from user space
- From: Dwi Sasongko Supriyadi <ruckuus@xxxxxxxxx>
- [ANNOUNCE] Linux Security Summit 2010 - Schedule Published
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] crypto: hash - Fix handling of small unaligned buffers
- From: Szilveszter Ördög <slipszi@xxxxxxxxx>
- Re: Crypto API from user space
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix ahash for multiple of blocksize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto API from user space
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Crypto API from user space
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Uri Simchoni <uri@xxxxxxxxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Phil Sutter <phil@xxxxxx>
- [RFC 9/9] crypto: Add Samsung crypto engine driver
- From: Maurus Cuelenaere <mcuelenaere@xxxxxxxxx>
- [RFC/PATCH 0/9] Samsung crypto engine
- From: Maurus Cuelenaere <mcuelenaere@xxxxxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Phil Sutter <phil@xxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Phil Sutter <phil@xxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Sebastian Andrzej Siewior <sebastian@xxxxxxxxxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- [PATCH] crypto: talitos - fix ahash for multiple of blocksize
- From: Lee Nipper <lee.nipper@xxxxxxxxx>
- Re: RFC: kcrypto - (yet another) user space interface
- From: Sebastian Andrzej Siewior <sebastian@xxxxxxxxxxxxx>
- RFC: kcrypto - (yet another) user space interface
- From: Phil Sutter <phil@xxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 2.6.35
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] crypto: twofish: Rename twofish to twofish_generic and add an alias
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add an option to disable cryptoalgos' self-tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add an option to disable cryptoalgos' self-tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 2.6.35
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] of/crypto: n2_core: fix build breakage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] of/crypto: n2_core: fix build breakage
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] of/crypto: n2_core.c: Fix build failures
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- Re: [PATCH] of/crypto: n2_core.c: Fix build failures
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] of/crypto: n2_core.c: Fix build failures
- From: Grant Likely <grant.likely@xxxxxxxxxxxx>
- [PATCH] of/crypto: n2_core.c: Fix build failures
- [RESEND][PATCH] crypto: twofish: Rename twofish to twofish_generic and add an alias
- From: Joachim Fritschi <jfritschi@xxxxxxxxxx>
- [PATCH] crypto: add an option to disable cryptoalgos' self-tests
- From: Alexander Shishkin <virtuoso@xxxxxxxxx>
- Re: [PATCH 0/7]: N2CRYPTO fixes and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] mv_cesa: fixup error handling in mv_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: disable tests when they are not enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] n2_crypto: Add HMAC support.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 6/7] n2_crypto: Make ahash parameterization explicit.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 5/7] n2_crypto: Log algorithm success/failure in kernel log.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 4/7] n2_crypto: Kill n2_base_ctx and helpers.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 3/7] n2_crypto: Plumb fallback ahash requests properly.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 2/7] n2_crypto: Fix MAU kmem_cache name.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 1/7] n2_crypto: Fix build after of_device/of_platform_driver changes.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 0/7]: N2CRYPTO fixes and HMAC support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: twofish: rename twofish to twofish_generic and add an alias
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 178/199] arch/s390/crypto/crypto_des.h: Checkpatch cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/12] crypto: omap: remove unused #include <linux/version.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/8] crypto: Use ERR_CAST
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]