Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 0/8] Add UFS support for SC7180/SM7125
- From: David Wronek <davidwronek@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION eff99d8edbed7918317331ebd1e365d8e955d65e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf-next v4 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH] hwrng: virtio - remove #ifdef guards for PM functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jh7110 - Correct deferred probe return
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - prevent underflow in rp2srv_store()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] drbg small fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: shash - don't exclude async statuses from error stats
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - print device abnormal information
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: ingenic: Replace of_device.h with explicit of.h include
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/crypto/aesgcm.c:add kernel docs for aesgcm_mac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,prng: document SM8650
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <leoliu-oc@xxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Add check for pci_find_ext_capability
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sa2ul - Add check for crypto_aead_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/10] Add Marvell CN10KB/CN10KA B0 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: arch/powerpc/crypto/aes-gcm-p10-glue.c:121:9: error: 'gcm_init_htable' accessing 256 bytes in a region of size 224
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - prevent underflow in rp2srv_store()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] crypto: skcipher - Add lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] crypto: skcipher - Add lskcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/8] crypto: skcipher - Add lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Pad adata with zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Add check for pci_find_ext_capability
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
- From: Rafał Miłecki <rafal@xxxxxxxxxx>
- [PATCH V2] dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: [PATCH] crypto: starfive - Pad adata with zeroes
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Pad adata with zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: starfive - Pad adata with zeroes
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: ross.philipson@xxxxxxxxxx
- [RESEND PATCH] hwrng: ingenic: Replace of_device.h with explicit of.h include
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: LeoLiu-oc <leoliu-oc@xxxxxxxxxxx>
- Re: [PATCH 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- Re: [PATCH 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- Re: [PATCH 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- [PATCH 2/2] crypto: starfive - RSA poll csr for done status
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: starfive - Minor fixes in driver
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: starfive - Update driver dependencies
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/4] Add SPACC driver to Linux kernel
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH 3/4] Add SPAcc dts overlay
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH 2/4] Add SPACC Kconfig and Makefile
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH 0/4] Add crypto spacc driver to support cipher, hash and aead
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: Non-existing CONFIG_ options are used in source code
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION d173336e238b0f7f5b7eddfa641d7c25c24bb86a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] RDMA/irdma: use crypto_shash_digest() in irdma_ieq_check_mpacrc()
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH] RDMA/siw: use crypto_shash_digest() in siw_qp_prepare_tx()
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Alyssa Ross <hi@xxxxxxxxx>
- [PATCH] hwrng: virtio - remove #ifdef guards for PM functions
- From: Martin Kaiser <martin@xxxxxxxxx>
- Aw: [PATCH 6/6] crypto: rockchip: add rk3588 driver
- From: Frank Wunderlich <frank-w@xxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: asymmetric_keys/pkcs7.asn1 - remove the duplicated contentType pkcs7_note_OID processing logic
- From: "YiLin.Li" <YiLin.Li@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 08/13] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 12/13] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 05/13] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 04/13] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 01/13] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 13/13] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 03/13] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 11/13] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH bpf-next v4 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v4 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] crypto: x86/sm2 -add Zhaoxin SM2 algorithm implementation
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- Re: [PATCH] crypto: jh7110 - Correct deferred probe return
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: jh7110 - Correct deferred probe return
- From: Chanho Park <chanho61.park@xxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon - Add check for pci_find_ext_capability
- From: Chen Ni <nichen@xxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH 72/86] treewide: crypto: remove cond_resched()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH 6/6] crypto: rockchip: add rk3588 driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: rockchip: add rk3588 driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/6] dt-bindings: crypto: add support for rockchip,crypto-rk3588
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: rockchip: add rk3588 driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 4/6] ARM64: dts: rk356x: add crypto node
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/6] ARM64: dts: rk3588: add crypto node
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/6] MAINTAINERS: add new dt-binding doc to the right entry
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 4/6] ARM64: dts: rk356x: add crypto node
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH 3/6] ARM64: dts: rk3588: add crypto node
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH 6/6] crypto: rockchip: add rk3588 driver
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 5/6] reset: rockchip: secure reset must be used by SCMI
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 4/6] ARM64: dts: rk356x: add crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 3/6] ARM64: dts: rk3588: add crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 2/6] MAINTAINERS: add new dt-binding doc to the right entry
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 1/6] dt-bindings: crypto: add support for rockchip,crypto-rk3588
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 0/6] crypto: rockchip: add support for rk3588/rk3568
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH AUTOSEL 4.14 1/9] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 01/11] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 01/12] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 02/16] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 02/22] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 27/30] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 03/30] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.5 31/34] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.5 04/34] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 33/36] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/36] crypto: pcrypt - Fix hungtask for PADATA_RESET
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH] hwrng: add Zhaoxin rng driver base on rep_xstore instruction
- From: LeoLiu-oc <LeoLiu-oc@xxxxxxxxxxx>
- [PATCH] crypto: sa2ul - Add check for crypto_aead_setkey
- From: Chen Ni <nichen@xxxxxxxxxxx>
- Question: Earliest kernel version with FIPS-compliant DRBG?
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH] crypto: ahash - Set using_shash for cloned ahash wrapper over shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ahash - Set using_shash for cloned ahash wrapper over shash
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- PSA: this list has been migrated (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] dt-bindings: crypto: qcom,prng: Add SM8450
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [RESEND PATCH] dt-bindings: crypto: qcom,prng: Add SM8450
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] dt-bindings: crypto: qcom,prng: Add SM8450
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION e27090b1413ff236ca1aec26d6b022149115de2c
- From: kernel test robot <lkp@xxxxxxxxx>
- [RESEND PATCH] dt-bindings: crypto: qcom,prng: Add SM8450
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 10/10] crypto: octeontx2: support setting ctx ilen for inline CPT LF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 09/10] crypto/octeontx2: register error interrupts for inline cptlf
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 08/10] crypto: octeontx2: add ctx_val workaround
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 07/10] octeontx2-af: update CPT inbound inline IPsec mailbox
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 06/10] crypto: octeontx2: add LF reset on queue disable
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 05/10] crypto: octeontx2: remove errata workaround for CN10KB or CN10KA B0 chip.
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 01/10] crypto: octeontx2: remove CPT block reset
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 02/10] crypto: octeontx2: add SGv2 support for CN10KB or CN10KA B0
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 00/10] Add Marvell CN10KB/CN10KA B0 support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Crypto Update for 6.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- RE: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- [GIT PULL] Crypto Update for 6.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 12/12] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- Re: [PATCH 04/12] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 7/7] crypto: Fixes uninitialized skcipher_walk use in aria_gfni_avx512_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 5/7] crypto: Fixes uninitialized skcipher_walk use in aria_aesni_avx2_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 6/7] crypto: Fixes uninitialized skcipher_walk use in aria_aesni_avx_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 3/7] crypto: Fixes uninitialized skcipher_walk use in chacha_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 4/7] crypto: Fixes uninitialized skcipher_walk use in aesni-intel_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 2/7] crypto: Fixes uninitialized skcipher_walk use in des3_ede_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 1/7] crypto: Fixes uninitialized skcipher_walk use in sm4_aesni_avx_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: linux-next: build failure after merge of the crypto tree
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Paulo Alcantara <pc@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Roxana Nicolescu <roxana.nicolescu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Roxana Nicolescu <roxana.nicolescu@xxxxxxxxxxxxx>
- Re: [ppc64le] WARN at crypto/testmgr.c:5804
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [ppc64le] WARN at crypto/testmgr.c:5804
- From: Sachin Sant <sachinp@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - prevent underflow in rp2srv_store()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm()
- From: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: J Lovejoy <opensource@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Christoph Hellwig <hch@xxxxxx>
- RE: [PATCH] RDMA/siw: use crypto_shash_digest() in siw_qp_prepare_tx()
- From: Bernard Metzler <BMT@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 0/4] drbg small fixes
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [bug report] lib/mpi: Extend the MPI library
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug report] lib/mpi: Extend the MPI library
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Steve French <smfrench@xxxxxxxxx>
- [PATCH 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: shash - don't exclude async statuses from error stats
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] dm-integrity: use crypto_shash_digest() in sb_mac()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] dm-crypt: use crypto_shash_digest() in crypt_iv_tcw_whitening()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] RDMA/siw: use crypto_shash_digest() in siw_qp_prepare_tx()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] RDMA/irdma: use crypto_shash_digest() in irdma_ieq_check_mpacrc()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - print device abnormal information
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] crypto: adiantum - flush destination page before unmapping
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH bpf-next v2 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH 00/30] crypto: reduce ahash API overhead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: pkcs7 x509 add FIPS 202 SHA-3 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - move adf_cfg_services
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] add ras error detection and reporting for GEN4 devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: jitter - use permanent health test storage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] crypto: stop supporting alignmask in shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: n2 - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccree - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,prng: document SM8650
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 12/12] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 11/12] RISC-V: crypto: add Zvksh accelerated SM3 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 09/12] RISC-V: crypto: add Zvknhb accelerated SHA384/512 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 10/12] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 08/12] RISC-V: crypto: add Zvknha/b accelerated SHA224/256 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 07/12] RISC-V: crypto: add Zvkg accelerated GCM GHASH implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 05/12] crypto: scatterwalk - Add scatterwalk_next() to get the next scatterlist in scatter_walk
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 04/12] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 03/12] RISC-V: crypto: add OpenSSL perl module for vector instructions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 02/12] RISC-V: hook new crypto subdir into build-system
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 01/12] RISC-V: add helper function to read the vector VLEN
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Issue: Can padata avoid dealing with CPU-related operations?
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] hwrng: ingenic: Replace of_device.h with explicit of.h include
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH 17/42] crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 05/42] crypto: amlogic-gxl-core - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 22/42] crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 04/30] crypto: sun8i-ss - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 03/30] crypto: sun8i-ce - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] lib/crypto/aesgcm.c:add kernel docs for aesgcm_mac
- From: Sagar Vashnav <sagarvashnav72427@xxxxxxxxx>
- Re: [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom,prng: document SM8650
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH 3/3] tee: amdtee: Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- Re: [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Andi Shyti <andi.shyti@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4 5/5] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 3/5] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 4/5] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 0/5] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] certs: Break circular dependency when selftest is modular
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 11/42] crypto: axis/artpec6 - Convert to platform remove callback returning void
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 07/42] crypto: aspeed-hace - Convert to platform remove callback returning void
- From: Andrew Jeffery <andrew@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/42] crypto: aspeed-acry - Convert to platform remove callback returning void
- From: Andrew Jeffery <andrew@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 6/6] Documentation/module-signing.txt: bring up to date
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: x509 pkcs7 - allow FIPS 202 SHA-3 signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: enable automatic module signing with FIPS 202 SHA-3
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: FIPS 202 SHA-3 register in hash info for IMA
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/6] x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: pkcs7 x509 add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 21/30] crypto: chacha20poly1305 - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 30/30] crypto: ahash - optimize performance when wrapping shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 28/30] crypto: hash - move "ahash wrapping shash" functions to ahash.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 29/30] crypto: ahash - check for shash type instead of not ahash type
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 27/30] crypto: talitos - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 26/30] crypto: chelsio - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 24/30] crypto: ahash - remove struct ahash_request_priv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 25/30] crypto: ahash - improve file comment
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 22/30] crypto: gcm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 23/30] crypto: ahash - remove crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 19/30] net: ipv6: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 18/30] net: ipv4: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/30] crypto: ahash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/30] crypto: ccm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/30] crypto: authencesn - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/30] crypto: stm32 - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 17/30] crypto: testmgr - stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/30] crypto: authenc - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/30] crypto: starfive - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/30] crypto: omap-sham - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/30] crypto: rockchip - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/30] crypto: s5p-sss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/30] crypto: mxs-dcp - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/30] crypto: talitos - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/30] crypto: sun8i-ce - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/30] crypto: atmel - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/30] crypto: artpec6 - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/30] crypto: sun8i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/30] crypto: reduce ahash API overhead
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/30] crypto: shash - remove crypto_shash_ctx_aligned()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: kernel test robot <lkp@xxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: mscode_parser - remove sha224 authenticode support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: qat - add heartbeat error simulator
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: qat - move adf_cfg_services
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- [PATCH v2 09/11] crypto: qat - add rate limiting sysfs interface
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 11/11] crypto: qat - add num_rps sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 10/11] crypto: qat - add rp2svc sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 07/11] crypto: qat - add retrieval of fw capabilities
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 06/11] crypto: qat - add bits.h to icp_qat_hw.h
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 05/11] units: Add BYTES_PER_*BIT
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 04/11] crypto: qat - move admin api
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 03/11] crypto: qat - fix ring to service map for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 02/11] crypto: qat - use masks for AE groups
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 01/11] crypto: qat - refactor fw config related functions
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] qat: fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 9/9] crypto: qat - count QAT GEN4 errors
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 8/9] crypto: qat - add error counters
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 4/9] crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 6/9] crypto: qat - add adf_get_aram_base() helper function
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 3/9] crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 5/9] crypto: qat - add handling of compression related errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 1/9] crypto: qat - add infrastructure for error reporting
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 2/9] crypto: qat - add reporting of correctable errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 0/9] add ras error detection and reporting for GEN4 devices
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: <Hari.PrasathGE@xxxxxxxxxxxxx>
- Re: [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH 00/42] crypto: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 07/42] crypto: aspeed-hace - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 39/42] crypto: stm32/cryp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 06/42] crypto: aspeed-acry - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 25/42] crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 38/42] crypto: stm32/crc32 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 24/42] crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 40/42] crypto: talitos - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 37/42] crypto: sahara - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 26/42] crypto: marvell/cesa - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 36/42] crypto: sa2ul - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 27/42] crypto: mxs-dcp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 22/42] crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 32/42] crypto: qce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 30/42] crypto: omap-des - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 18/42] crypto: hisilicon/sec - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 31/42] crypto: omap-sham - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 29/42] crypto: omap-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 28/42] crypto: n2_core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 23/42] crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 13/42] crypto: caam/jr - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 21/42] crypto: inside-secure/safexcel - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 12/42] crypto: bcm/cipher - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 20/42] crypto: img-hash - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 11/42] crypto: axis/artpec6 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 17/42] crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 10/42] crypto: atmel-tdes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 15/42] crypto: ccree/cc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 09/42] crypto: atmel-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 04/42] crypto: amcc/crypto4xx - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 05/42] crypto: amlogic-gxl-core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: skcipher - fix weak key check for lskciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] module: Do not offer sha224 for built-in module signing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pkcs7: remove sha1 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - clean up backwards function names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: adiantum optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix double free during reset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha2-ce - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: shash optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v2] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: jitter - use permanent health test storage
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 17/17] crypto: shash - remove crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/17] crypto: testmgr - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/17] crypto: shash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/17] crypto: hctr2 - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/17] crypto: adiantum - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/17] crypto: xcbc - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/17] crypto: drbg - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/17] libceph: stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/17] crypto: hmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/17] crypto: cmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/17] crypto: vmac - don't set alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/17] crypto: cbcmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/17] crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/17] crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/17] crypto: mips/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/17] crypto: stm32 - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/17] crypto: sparc/crc32c - stop using the shash alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/17] crypto: stop supporting alignmask in shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH] crypto: shash - eliminate indirect call for default import and export
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: André Apitzsch <git@xxxxxxxxxxx>
- Re: [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 49/50] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 50/50] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 47/50] x86/sev: Add KVM commands for per-instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 45/50] iommu/amd: Report all cases inhibiting SNP enablement
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 44/50] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 43/50] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 42/50] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 03/50] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 41/50] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 40/50] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 39/50] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 37/50] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 36/50] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 35/50] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 34/50] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 33/50] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 32/50] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 31/50] KVM: SEV: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 02/50] KVM: SVM: Fix TSC_AUX virtualization setup
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 30/50] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 29/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 28/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 27/50] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 26/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 25/50] KVM: SEV: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 21/50] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 19/50] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]