Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Christoph Müllner <christoph.muellner@xxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: (subset) [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 39/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/10] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 09/10] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 08/10] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 06/10] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 07/10] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 04/10] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 05/10] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 03/10] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 02/10] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 01/10] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v4 8/8] arm64: dts: qcom: Add support for Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 7/8] arm64: dts: qcom: sm7125-xiaomi-common: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 6/8] arm64: dts: qcom: sc7180: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 5/8] phy: qcom: qmp-ufs: Add SC7180 support
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 4/8] dt-bindings: arm: qcom: Add Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: Erick Archer <erick.archer@xxxxxxx>
- [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Erick Archer <erick.archer@xxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 02/13] dt-bindings: treewide: add access-controllers description
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH] crypto: hisilicon - Fix smp_processor_id() warnings
- From: Wenkai Lin <linwenkai6@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: taoqi <taoqi10@xxxxxxxxxx>
- [PATCH v2 8/8] crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: arm64/aes-ccm - Pass short inputs via stack buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 0/8] crypto: Clean up arm64 AES-CCM code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2] crypto: caam: fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH][next] crypto: pcbc: remove redundant assignment to nbytes
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Fabio Estevam <festevam@xxxxxxxxx>
- RE: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2 5/5] crypto: starfive: Add sm4 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] crypto: starfive: Update hash dma usage
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: starfive: Add support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: starfive: Use dma for aes requests
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] dt-bindings: crypto: starfive: Add jh8100 compatible string
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Mikko Perttunen <cyndis@xxxxxxxx>
- [PATCH 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH AUTOSEL 4.19 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/13] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 08/13] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 10/14] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 08/14] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 14/19] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 12/19] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 11/19] crypto: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 08/19] crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 07/19] hwrng: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 14/19] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 12/19] crypto: octeontx2 - Fix cptvf driver cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 11/19] crypto: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 08/19] crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 07/19] hwrng: starfive - Fix dev_err_probe return error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v8 3/3] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in af_alg_free_sg (2)
- From: syzbot <syzbot+3266db0c26d1fbbe3abb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in lzo1x_1_do_compress (2)
- From: syzbot <syzbot+9a049ebdaacbb076e50a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/qm - dump important registers values before resetting
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/qm - support get device state
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon/qm - add debugfs qm_state for hisilicon driver
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Clay Chang <clayc@xxxxxxx>
- [PATCH v6 RESEND 5/5] crypto: LEA block cipher x86_64 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 4/5] fscrypt: Add LEA-256-XTS, LEA-256-CTS support
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 3/5] blk-crypto: Add LEA-256-XTS blk-crypto support
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 2/5] crypto: add LEA testmgr tests
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 1/5] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v6 RESEND 0/5] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Rebuilding at least part of my krb5 crypto lib on crypto-aead
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] docs: admin-guide: hw_random: update rng-tools website
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 8/8] crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helper
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 7/8] crypto: arm64/aes-ccm - Merge encrypt and decrypt asm routines
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 6/8] crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 5/8] crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 3/8] crypto: arm64/aes-ccm - Pass short inputs via stack buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 2/8] crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 1/8] crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH 0/8] crypto: Clean up arm64 AES-CCM code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- RE: [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- RE: [EXT] RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 01/24] drivers: crypto: meson: don't hardcode IRQ count
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 02/24] drivers: crypto: meson: make CLK controller optional
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 17/24] arch: arm64: dts: meson: a1: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v1 04/24] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 00/24] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 02/24] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 06/24] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v1 24/24] arch: arm64: dts: meson: g12a-u200: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 23/24] arch: arm64: dts: meson: axg-s400: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 22/24] arch: arm64: dts: meson: a1-ad401: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 21/24] arch: arm64: dts: meson: s4-s805x2-aq222: enable crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 20/24] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 19/24] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 18/24] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 17/24] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 16/24] dt-bindings: crypto: meson: add new compatibles
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 15/24] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 14/24] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 11/24] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 13/24] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 12/24] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 05/24] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 03/24] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 10/24] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 09/24] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 07/24] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 01/24] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v1 08/24] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Conor Dooley <conor@xxxxxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [EXT] RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- RE: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Recall: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: "Gaurav Jain (OSS)" <gaurav.jain@xxxxxxxxxxx>
- RE: [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: "Gaurav Jain (OSS)" <gaurav.jain@xxxxxxxxxxx>
- [REMINDER] Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [GIT PULL] Crypto Update for 6.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] treewide: Update LLVM Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 2/3] arch and include: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in chksum_update
- From: syzbot <syzbot+9c0d9ba56264f1602420@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- [PATCH v3 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v3 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Minjie Du <duminjie@xxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Clay Chang <clayc@xxxxxxx>
- Re: [PATCH] crypto: iaa - Remove header table code
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH] crypto: iaa - Remove header table code
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [bug report] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] docs: admin-guide: hw_random: update rng-tools website
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [bug report] crypto: iaa - Add compression mode management along with fixed mode
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH] KEYS: include header for EINVAL definition
- Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys/pkcs7.asn1 - remove the duplicated contentType pkcs7_note_OID processing logic
- From: "YiLin.Li" <YiLin.Li@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Jacob Xu <jacobhxu@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 12/12] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 11/12] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 10/12] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 09/12] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 08/12] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 07/12] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 06/12] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 05/12] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 04/12] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 03/12] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 02/12] riscv: vector: make Vector always available for softirq context
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 01/12] riscv: Add support for kernel mode vector
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 00/12] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: qat - add support for 420xx devices
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- [PATCH 0/2] Add Crypto Engine support for SM6350
- From: Luca Weiss <luca.weiss@xxxxxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v9 12/13] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 13/13] ARM: dts: stm32: put ETZPC as an access controller for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 09/13] bus: etzpc: introduce ETZPC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 08/13] arm64: dts: st: add RIFSC as an access controller for STM32MP25x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 10/13] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 11/13] ARM: dts: stm32: put ETZPC as an access controller for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 06/13] of: property: fw_devlink: Add support for "access-controller"
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 07/13] bus: rifsc: introduce RIFSC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 04/13] dt-bindings: bus: document ETZPC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 05/13] firewall: introduce stm32_firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 01/13] dt-bindings: document generic access controllers
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 02/13] dt-bindings: treewide: add access-controllers description
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 03/13] dt-bindings: bus: document RIFSC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v9 00/13] Introduce STM32 Firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH v8 03/13] dt-bindings: bus: document RIFSC
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [EXT] caam test failures with libkcapi
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 1/3] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 0/3] mm/zswap & crypto/acompress: remove a couple of memcpy
- From: Barry Song <21cnbao@xxxxxxxxx>
- RE: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 9/9] crypto: qat - improve aer error reset handling
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 8/9] crypto: qat - limit heartbeat notifications
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - add auto reset on error
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 5/9] crypto: qat - re-enable sriov after pf reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 6/9] crypto: qat - add fatal error notification
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 3/9] crypto: qat - disable arbitration before reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 4/9] crypto: qat - update PFVF protocol for recovery
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 2/9] crypto: qat - add fatal error notify method
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH 0/9] crypto: qat - improve recovery flows
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: xingwei lee <xrivendell7@xxxxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC 2/2] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH RFC 1/2] crypto: introduce acomp_is_async to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH RFC] dt-bindings: crypto: inside-secure,safexcel: make eip/mem IRQs optional
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 13/13] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 12/13] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 11/13] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 10/13] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 09/13] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 08/13] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 07/13] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 06/13] crypto: riscv - add vector crypto accelerated AES
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 05/13] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 04/13] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 03/13] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 02/13] riscv: vector: make Vector always available for softirq context
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 01/13] riscv: Add support for kernel mode vector
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 00/13] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- RE: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH RFC] dt-bindings: crypto: inside-secure,safexcel: make eip/mem IRQs optional
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v4 11/11] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 10/11] RISC-V: crypto: add Zvksh accelerated SM3 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 09/11] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 08/11] RISC-V: crypto: add Zvknhb accelerated SHA384/512 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 07/11] RISC-V: crypto: add Zvknha/b accelerated SHA224/256 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 06/11] RISC-V: crypto: add Zvkg accelerated GCM GHASH implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 05/11] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 04/11] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 03/11] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO in kconfig
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 02/11] RISC-V: hook new crypto subdir into build-system
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 01/11] RISC-V: add helper function to read the vector VLEN
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH v4 00/11] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v11 08/35] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 07/35] KVM: x86: Add KVM_X86_SNP_VM vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 05/35] KVM: x86: Add gmem hook for invalidating memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 04/35] KVM: x86: Add gmem hook for initializing memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 03/35] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 35/35] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 34/35] crypto: ccp: Add the SNP_SET_CONFIG_{START,END} commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 33/35] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 32/35] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 31/35] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 02/35] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 29/35] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 28/35] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 27/35] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 25/35] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 24/35] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 23/35] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 22/35] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 21/35] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 01/35] KVM: Add hugepage support for dedicated guest memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 20/35] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 19/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 17/35] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 16/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 14/35] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 13/35] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 12/35] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 11/35] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 10/35] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 05/26] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 02/26] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 23/26] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 19/26] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 16/26] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 09/26] x86/fault: Dump RMP table information when RMP page faults occur
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 08/26] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v1 06/26] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V3 2/2] arm64: dts: qcom: sc7280: add QCrypto nodes
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 4/4] crypto: hisilicon/sec - remove unused parameter
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH 1/4] crypto: hisilicon/sec2 - updates the sec DFX function register
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon/sec2 - modify nested macro call
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Account for cpu-less numa nodes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: scompress - fix req->dst buffer overflow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] crypto: sahara - bugfixes and small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: shash - remove excess kerneldoc members
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - generate dynamically arbiter mappings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: qat - enable telemetry for QAT GEN 4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: Intel Analytics Accelerator (IAA) updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: iaa - remove unneeded semicolon
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: rk3288 - Use helper to set reqsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto:tcrypt: add script tcrypt_speed_compare.py
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Add Marvell CPT CN10KB/CN10KA B0 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [PATCH V3 2/2] arm64: dts: qcom: sc7280: add QCrypto nodes
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: syzbot <syzbot+3eff5e51bf1db122a16e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- [PATCH v2] crypto: iaa - Account for cpu-less numa nodes
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v2] crypto: scompress - fix req->dst buffer overflow
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v2] crypto: scompress - fix req->dst buffer overflow
- From: chengming.zhou@xxxxxxxxx
- Re: [PATCH] crypto: scompress - fix req->dst buffer overflow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: scompress - fix req->dst buffer overflow
- From: Chengming Zhou <chengming.zhou@xxxxxxxxx>
- Re: [PATCH] crypto: scompress - fix req->dst buffer overflow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH] crypto: scompress - fix req->dst buffer overflow
- From: chengming.zhou@xxxxxxxxx
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: Shigeru Yoshida <syoshida@xxxxxxxxxx>
- [PATCH v5] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chris Li <chrisl@xxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Account for cpu-less numa nodes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Chris Li <chrisl@xxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Account for cpu-less numa nodes
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Account for cpu-less numa nodes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- [PATCH] crypto: iaa - Account for cpu-less numa nodes
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [syzbot] [crypto?] general protection fault in scatterwalk_copychunks (5)
- From: syzbot <syzbot+3eff5e51bf1db122a16e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: qat - add support for 420xx devices
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH v4] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 5/8] phy: qcom: qmp-ufs: Add SC7180 support
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v3 8/8] arm64: dts: qcom: Add support for Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 7/8] arm64: dts: qcom: sm7125-xiaomi-common: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 6/8] arm64: dts: qcom: sc7180: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 5/8] phy: qcom: qmp-ufs: Add SC7180 support
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 4/8] dt-bindings: arm: qcom: Add Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v3 0/8] Add UFS support for SC7180/SM7125
- From: David Wronek <davidwronek@xxxxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- [PATCH v4] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- [PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH next] crypto: fix oob Read in arc4_crypt
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 14/14] crypto: sahara - add support for crypto_engine
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 13/14] crypto: sahara - remove error message for bad aes request size
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 10/14] crypto: sahara - use dev_err_probe()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 12/14] crypto: sahara - remove unnecessary NULL assignments
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 11/14] crypto: sahara - remove 'active' flag from sahara_aes_reqctx struct
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 09/14] crypto: sahara - use devm_clk_get_enabled()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 08/14] crypto: sahara - use BIT() macro
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 07/14] crypto: sahara - clean up macro indentation
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 05/14] crypto: sahara - fix processing hash requests with req->nbytes < sg->length
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 00/14] crypto: sahara - bugfixes and small improvements
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 06/14] crypto: sahara - do not resize req->src when doing hash operations
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 04/14] crypto: sahara - improve error handling in sahara_sha_process()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 03/14] crypto: sahara - fix wait_for_completion_timeout() error handling
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 02/14] crypto: sahara - fix ahash reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH v2 01/14] crypto: sahara - handle zero-length aes requests
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 14/14] crypto: sahara - add support for crypto_engine
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 13/14] crypto: sahara - remove error message for bad aes request size
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 10/14] crypto: sahara - use dev_err_probe()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 12/14] crypto: sahara - remove unnecessary NULL assignments
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 09/14] crypto: sahara - use devm_clk_get_enabled()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 08/14] crypto: sahara - use BIT() macro
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 07/14] crypto: sahara - clean up macro indentation
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 06/14] crypto: sahara - do not resize req->src when doing hash operations
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 05/14] crypto: sahara - fix processing hash requests with req->nbytes < sg->length
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 11/14] crypto: sahara - remove 'active' flag from sahara_aes_reqctx struct
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 01/14] crypto: sahara - handle zero-length aes requests
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 04/14] crypto: sahara - improve error handling in sahara_sha_process()
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 03/14] crypto: sahara - fix wait_for_completion_timeout() error handling
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 02/14] crypto: sahara - fix ahash reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- Re: [PATCH 2/2] crypto: skcipher - remove excess kerneldoc members
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: shash - remove excess kerneldoc members
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [EXT] caam test failures with libkcapi
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 1/2] crypto: shash - remove excess kerneldoc members
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- [PATCH 2/2] crypto: skcipher - remove excess kerneldoc members
- From: Vegard Nossum <vegard.nossum@xxxxxxxxxx>
- Re: [PATCH v3] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: qat - generate dynamically arbiter mappings
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- RE: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: "Gaurav Jain (OSS)" <gaurav.jain@xxxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2 4/4] crypto: qat - add support for ring pair level telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v2 3/4] crypto: qat - add support for device telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v2 1/4] crypto: qat - include pci.h for GET_DEV()
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v2 2/4] crypto: qat - add admin msgs for telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v2 0/4] crypto: qat - enable telemetry for QAT GEN 4
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v3 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: stm32/crc32 - fix parsing list of devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: qat - add support for 420xx devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] dt-bindings: crypto: qcom-qce: document the SC7280 crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lib/mpi - Fix unexpected pointer access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: crypto: qcom-qce: constrain clocks for IPQ9574 QCE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: starfive: Add support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: virtio-crypto: Wait for tasklet to complete on device remove
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] math.h: Add avg_array()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 00/10] Add Marvell CPT CN10KB/CN10KA B0 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg/hash: Fix uninit-value access in af_alg_free_sg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: virtio-crypto: Fix gcc check warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- caam test failures with libkcapi
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH v8 06/13] of: property: fw_devlink: Add support for "access-controller"
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 04/13] dt-bindings: bus: document ETZPC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 03/13] dt-bindings: bus: document RIFSC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 01/13] dt-bindings: document generic access controllers
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Kun Song <Kun.Song@xxxxxxxxxxxxx>
- [PATCH v3] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- [PATCH v4] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- [PATCH] crypto: skcipher - Pass statesize for simple lskcipher instances
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH next] crypto: fix oob Read in arc4_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH next] crypto: fix oob Read in arc4_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH next] crypto: fix oob Read in arc4_crypt
- From: Edward Adam Davis <eadavis@xxxxxx>
- Re: [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Christoph Müllner <christoph.muellner@xxxxxxxx>
- Re: [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Performance drop due to alloc_workqueue() misuse and recent change
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH] crypto: riscv - use real assembler for vector crypto extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] crypto: iaa - remove unneeded semicolon
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- RE: [PATCH 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v2 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH] crypto: iaa - remove unneeded semicolon
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/7] crypto: sl3516 - Use helper to set reqsize
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: iaa - Change desc->priv to 0
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: iaa - Change desc->priv to 0
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH 2/2] crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: iaa - Change desc->priv to 0
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: Intel Analytics Accelerator (IAA) updates
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] crypto: sun8i-ss - Use helper to set reqsize
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 6/7] crypto: sun8i-ce - Use helper to set reqsize
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 7/7] crypto: sun8i-ss - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 6/7] crypto: sun8i-ce - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 4/7] crypto: stm32/cryp - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 5/7] crypto: sl3516 - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 1/7] crypto: rk3288 - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 3/7] crypto: artpec6 - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- [PATCH 2/7] crypto: amlogic - Use helper to set reqsize
- From: ovidiu.panait@xxxxxxxxxxxxx
- Re: [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] [crypto?] KASAN: slab-out-of-bounds Read in arc4_crypt
- From: syzbot <syzbot+8ffb0839a24e9c6bfa76@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto:tcrypt: add script tcrypt_speed_compare.py
- From: WangJinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- Re: [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v6 0/5] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH v5 RESEND] sign-file: Fix incorrect return values check
- From: Yusong Gao <a869920004@xxxxxxxxx>
- linux-next: manual merge of the crypto tree with the jc_docs, wireless-next trees
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH V3 0/2] Add QCrypto support for SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: starfive: Add sm4 support for JH8100
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: starfive: Add sm3 support for JH8100
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: starfive: Add sm3 support for JH8100
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/5] dt-bindings: crypto: starfive: Add jh8100 compatible string
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH 5/5] crypto: starfive: Add sm4 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 3/5] crypto: starfive: Use dma for aes requests
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] crypto: starfive: Update hash dma usage
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] dt-bindings: crypto: starfive: Add jh8100 compatible string
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] crypto: starfive: Add support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/14] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: qat - add support for ring pair level telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 4/5] crypto: qat - add support for device telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 3/5] crypto: qat - add admin msgs for telemetry
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 2/5] crypto: qat - include pci.h for GET_DEV()
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 1/5] math.h: Add avg_array()
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 0/5] crypto: qat - enable telemetry for QAT GEN 4
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH] crypto: stm32/crc32 - fix parsing list of devices
- From: Thomas Bourgoin <thomas.bourgoin@xxxxxxxxxxx>
- [PATCH v5 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]