Linux Crypto
[Prev Page][Next Page]
- [PATCH 6/6] Documentation/module-signing.txt: bring up to date
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: x509 pkcs7 - allow FIPS 202 SHA-3 signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: enable automatic module signing with FIPS 202 SHA-3
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: FIPS 202 SHA-3 register in hash info for IMA
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/6] x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: pkcs7 x509 add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 21/30] crypto: chacha20poly1305 - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 30/30] crypto: ahash - optimize performance when wrapping shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 28/30] crypto: hash - move "ahash wrapping shash" functions to ahash.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 29/30] crypto: ahash - check for shash type instead of not ahash type
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 27/30] crypto: talitos - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 26/30] crypto: chelsio - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 24/30] crypto: ahash - remove struct ahash_request_priv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 25/30] crypto: ahash - improve file comment
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 22/30] crypto: gcm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 23/30] crypto: ahash - remove crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 19/30] net: ipv6: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 18/30] net: ipv4: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/30] crypto: ahash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/30] crypto: ccm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/30] crypto: authencesn - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/30] crypto: stm32 - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 17/30] crypto: testmgr - stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/30] crypto: authenc - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/30] crypto: starfive - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/30] crypto: omap-sham - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/30] crypto: rockchip - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/30] crypto: s5p-sss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/30] crypto: mxs-dcp - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/30] crypto: talitos - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/30] crypto: sun8i-ce - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/30] crypto: atmel - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/30] crypto: artpec6 - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/30] crypto: sun8i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/30] crypto: reduce ahash API overhead
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/30] crypto: shash - remove crypto_shash_ctx_aligned()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: kernel test robot <lkp@xxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: mscode_parser - remove sha224 authenticode support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: qat - add heartbeat error simulator
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: qat - move adf_cfg_services
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- [PATCH v2 09/11] crypto: qat - add rate limiting sysfs interface
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 11/11] crypto: qat - add num_rps sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 10/11] crypto: qat - add rp2svc sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 07/11] crypto: qat - add retrieval of fw capabilities
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 06/11] crypto: qat - add bits.h to icp_qat_hw.h
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 05/11] units: Add BYTES_PER_*BIT
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 04/11] crypto: qat - move admin api
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 03/11] crypto: qat - fix ring to service map for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 02/11] crypto: qat - use masks for AE groups
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 01/11] crypto: qat - refactor fw config related functions
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] qat: fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 9/9] crypto: qat - count QAT GEN4 errors
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 8/9] crypto: qat - add error counters
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 4/9] crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 6/9] crypto: qat - add adf_get_aram_base() helper function
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 3/9] crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 5/9] crypto: qat - add handling of compression related errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 1/9] crypto: qat - add infrastructure for error reporting
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 2/9] crypto: qat - add reporting of correctable errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 0/9] add ras error detection and reporting for GEN4 devices
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: <Hari.PrasathGE@xxxxxxxxxxxxx>
- Re: [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH 00/42] crypto: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 07/42] crypto: aspeed-hace - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 39/42] crypto: stm32/cryp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 06/42] crypto: aspeed-acry - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 25/42] crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 38/42] crypto: stm32/crc32 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 24/42] crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 40/42] crypto: talitos - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 37/42] crypto: sahara - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 26/42] crypto: marvell/cesa - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 36/42] crypto: sa2ul - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 27/42] crypto: mxs-dcp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 22/42] crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 32/42] crypto: qce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 30/42] crypto: omap-des - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 18/42] crypto: hisilicon/sec - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 31/42] crypto: omap-sham - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 29/42] crypto: omap-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 28/42] crypto: n2_core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 23/42] crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 13/42] crypto: caam/jr - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 21/42] crypto: inside-secure/safexcel - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 12/42] crypto: bcm/cipher - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 20/42] crypto: img-hash - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 11/42] crypto: axis/artpec6 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 17/42] crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 10/42] crypto: atmel-tdes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 15/42] crypto: ccree/cc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 09/42] crypto: atmel-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 04/42] crypto: amcc/crypto4xx - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 05/42] crypto: amlogic-gxl-core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: skcipher - fix weak key check for lskciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] module: Do not offer sha224 for built-in module signing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pkcs7: remove sha1 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - clean up backwards function names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: adiantum optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix double free during reset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha2-ce - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: shash optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v2] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: jitter - use permanent health test storage
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 17/17] crypto: shash - remove crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/17] crypto: testmgr - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/17] crypto: shash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/17] crypto: hctr2 - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/17] crypto: adiantum - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/17] crypto: xcbc - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/17] crypto: drbg - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/17] libceph: stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/17] crypto: hmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/17] crypto: cmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/17] crypto: vmac - don't set alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/17] crypto: cbcmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/17] crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/17] crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/17] crypto: mips/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/17] crypto: stm32 - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/17] crypto: sparc/crc32c - stop using the shash alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/17] crypto: stop supporting alignmask in shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH] crypto: shash - eliminate indirect call for default import and export
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: André Apitzsch <git@xxxxxxxxxxx>
- Re: [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 49/50] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 50/50] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 47/50] x86/sev: Add KVM commands for per-instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 45/50] iommu/amd: Report all cases inhibiting SNP enablement
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 44/50] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 43/50] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 42/50] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 03/50] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 41/50] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 40/50] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 39/50] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 37/50] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 36/50] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 35/50] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 34/50] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 33/50] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 32/50] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 31/50] KVM: SEV: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 02/50] KVM: SVM: Fix TSC_AUX virtualization setup
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 30/50] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 29/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 28/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 27/50] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 26/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 25/50] KVM: SEV: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 21/50] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 19/50] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 16/50] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 15/50] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 14/50] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 13/50] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 12/50] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 10/50] x86/fault: Report RMP page faults for kernel addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- [PATCH RFC gmem v1 7/8] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 6/8] KVM: x86: Add KVM_X86_SNP_VM vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 5/8] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 2/8] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 1/8] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC PATCH] crypto: de-prioritize QAT
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] crypto: qat - add retrieval of fw capabilities
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- [PATCH 00/10] Add Marvell CN10KB/CN10KA B0 support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 10/10] crypto: octeontx2: support setting ctx ilen for inline CPT LF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 09/10] crypto/octeontx2: register error interrupts for inline cptlf
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 08/10] crypto: octeontx2: add ctx_val workaround
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 07/10] octeontx2-af: update CPT inbound inline IPsec mailbox
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 06/10] crypto: octeontx2: add LF reset on queue disable
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 05/10] crypto: octeontx2: remove errata workaround for CN10KB or CN10KA B0 chip.
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 02/10] crypto: octeontx2: add SGv2 support for CN10KB or CN10KA B0
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 01/10] crypto: octeontx2: remove CPT block reset
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH] crypto: rsa - Add module alias for pkcs1pad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] certs: Break circular dependency when selftest is modular
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: (subset) [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH V1 1/4] dt-bindings: crypto: qcom,prng: document SA8775P
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: WangJinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH V1 3/4] arm64: dts: qcom: sa8775p: add TRNG node
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 4/4] arm64: dts: qcom: sc7280: add TRNG node
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 1/4] dt-bindings: crypto: qcom,prng: document SA8775P
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION e3b18f7200f45d66f7141136c25554ac1e82009b
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] misc: Add Nitro Secure Module driver
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - alloc buffer to set and get xqc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitter - reuse allocated entropy collector
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: n2: Use device_get_match_data()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: qat - add cnv_errors debugfs file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] Add debugfs pm_status for qat driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add namespace to driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: qcom-rng - Add hw_random interface support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: authencesn - Fix incorrect setauthsize function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: authencesn - Fix incorrect setauthsize function
- From: Ingyu Jang <ingyujang25@xxxxxxxxxxx>
- Re: [syzbot] [net] [crypto] general protection fault in scatterwalk_copychunks (4)
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - fix weak key check for lskciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: skcipher - fix weak key check for lskciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [syzbot] [net] [crypto] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH] crypto: hifn_795x - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: lskcipher - Return EINVAL when ecb_name fails sanity checks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Alistair Francis <Alistair.Francis@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Alistair Francis <Alistair.Francis@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Petre Eftime <petre.eftime@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 01/11] crypto: qat - refactor fw config related functions
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 03/11] crypto: qat - fix ring to service map for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 07/11] crypto: qat - add retrieval of fw capabilities
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 05/11] units: Add BYTES_PER_*BIT
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 10/11] crypto: qat - add rp2svc sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 09/11] crypto: qat - add rate limiting sysfs interface
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 11/11] crypto: qat - add num_rps sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 04/11] crypto: qat - move admin api
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 06/11] crypto: qat - add bits.h to icp_qat_hw.h
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 02/11] crypto: qat - use masks for AE groups
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v6] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] module: Do not offer sha224 for built-in module signing
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: pkcs7: remove sha1 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.6
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v6 11/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 08/11] arm64: dts: st: add RIFSC as an access controller for STM32MP25x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 09/11] bus: etzpc: introduce ETZPC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 04/11] dt-bindings: bus: document ETZPC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 07/11] bus: rifsc: introduce RIFSC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 06/11] of: property: fw_devlink: Add support for "access-controller"
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 05/11] firewall: introduce stm32_firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 00/11] Introduce STM32 Firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 03/11] dt-bindings: bus: document RIFSC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 02/11] dt-bindings: treewide: add access-controllers description
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 01/11] dt-bindings: document generic access controllers
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] hwrng: geode: fix accessing registers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH 5/5] crypto: arm64/sha512 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/5] crypto: arm64/sha256 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm64/sha512-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/5] crypto: arm64/sha2-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/5] crypto: arm64/sha1-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/5] crypto: arm64 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 2/2] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: adiantum - add fast path for single-page messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/4] crypto: arm/nhpoly1305 - implement ->digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/4] crypto: arm64/nhpoly1305 - implement ->digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/4] crypto: adiantum optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/4] crypto: x86/nhpoly1305 - implement ->digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Andrew Jeffery <andrew@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v4 0/2] Add Nitro Secure Module support
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: qat - fix double free during reset
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 0/9] hwrng: stm32: support STM32MP13x platforms
- From: Alexandre TORGUE <alexandre.torgue@xxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH] crypto: x86/sha256 - implement ->digest for sha256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: arm64/sha2-ce - implement ->digest for sha256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: shash optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: shash - fold shash_digest_unaligned() into crypto_shash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: shash - optimize the default digest and finup
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - fix weak key check for lskciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - alloc buffer to set and get xqc
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH] crypto: remove md4 driver
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 05/12] crypto: akcipher - Support more than one signature encoding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: jitter - reuse allocated entropy collector
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] virtio-crypto: handle config changed by work queue
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH v2] padata: Fix the UAF issue related to parallel_data
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: Issue: Can padata avoid dealing with CPU-related operations?
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] hwrng: n2: Use device_get_match_data()
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: He-Jie Shih <bignose1007@xxxxxxxxx>
- RE: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 05/12] crypto: akcipher - Support more than one signature encoding
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 03/12] X.509: Move certificate length retrieval into new helper
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 02/12] X.509: Parse Subject Alternative Name in certificates
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 01/12] X.509: Make certificate parser public
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: [PATCH 00/12] PCI device authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] hwrng: geode: fix accessing registers
- From: Jonas Gorski <jonas.gorski@xxxxxxxxx>
- Re: [PATCH] dm crypt: Fix reqsize in crypt_iv_eboiv_gen
- From: Tatu Heikkilä <tatu.heikkila@xxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: dm crypt: Fix reqsize in crypt_iv_eboiv_gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] Meson S4 HW RNG Support
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: dm crypt: Fix reqsize in crypt_iv_eboiv_gen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: dm crypt: Fix reqsize in crypt_iv_eboiv_gen
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- [PATCH] dm crypt: Fix reqsize in crypt_iv_eboiv_gen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 11/12] PCI/CMA: Expose in sysfs whether devices are authenticated
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 08/12] PCI/CMA: Authenticate devices on enumeration
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 09/12] PCI/CMA: Validate Subject Alternative Name in certificates
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - fix PF queue parameter issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Move akcipher_request_cast helper to crypto header
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Add missing IMPLICIT annotations to AKID ASN.1 module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pkcs7: remove md4 md5 x.509 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - fix the type value of aeq
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: fsl-imx-sahara: Shorten the title
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] Meson S4 HW RNG Support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - check function qp num before alg register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: x86/aesni - Improve XTS data type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: akcipher - fix kernel-doc typos
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/12] PCI/CMA: Validate Subject Alternative Name in certificates
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: Linux 6.1.52 regression: Intel QAT kernel panic (memory corruption)
- From: Kyle Sanderson <kyle.leet@xxxxxxxxx>
- [bug report] crypto: jitter - add RCT/APT support for different OSRs
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2] padata: Fix the UAF issue related to parallel_data
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: Issue: padata: UAF in padata_serial_worker reproduce
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2] padata: Fix the UAF issue related to parallel_data
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: Issue: Can padata avoid dealing with CPU-related operations?
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v4] crypto: qat - add cnv_errors debugfs file
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v6 0/2] Add debugfs pm_status for qat driver
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v6 2/2] crypto: qat - add pm_status debugfs file
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH v6 1/2] crypto: qat - refactor included headers
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: qat - add pm_status debugfs file
- From: Lucas Segarra <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: qcom-rng - Add hw_random interface support
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH V2] hwrng: bcm2835: Fix hwrng throughput regression
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH V2] hwrng: bcm2835: Fix hwrng throughput regression
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Wilfred Mallawa <wilfred.mallawa@xxxxxxx>
- Re: [PATCH 02/12] X.509: Parse Subject Alternative Name in certificates
- From: Wilfred Mallawa <wilfred.mallawa@xxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 11/12] PCI/CMA: Expose in sysfs whether devices are authenticated
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - Add dependency on ecb
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 02/12] X.509: Parse Subject Alternative Name in certificates
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 01/12] X.509: Make certificate parser public
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 10/12] PCI/CMA: Reauthenticate devices on reset and resume
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 09/12] PCI/CMA: Validate Subject Alternative Name in certificates
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 08/12] PCI/CMA: Authenticate devices on enumeration
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 0/16] crypto: Only use common fields on skcipher spawn algs
- From: Shinichiro Kawasaki <shinichiro.kawasaki@xxxxxxx>
- Re: [PATCH V2] hwrng: bcm2835: Fix hwrng throughput regression
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] dt-bindings: crypto: qcom,prng: document that RNG on SM8450 is a TRNG
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 11/12] PCI/CMA: Expose in sysfs whether devices are authenticated
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] X.509: Parse Subject Alternative Name in certificates
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] X.509: Move certificate length retrieval into new helper
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/11] dt-bindings: bus: document RIFSC
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 01/12] X.509: Make certificate parser public
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/11] dt-bindings: document generic access controller
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v4 5/5] arm64: dts: qcom: sm8450: add TRNG node
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH v4 2/5] dt-bindings: crypto: qcom,prng: document SM8550
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH v4 4/5] arm64: dts: qcom: sm8550: add TRNG node
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH v4 1/5] dt-bindings: crypto: qcom,prng: document that RNG on SM8450 is a TRNG
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: qcom-rng - Add hw_random interface support
- From: neil.armstrong@xxxxxxxxxx
- Re: [EXTERNAL] Re: [EXTERNAL] Re: [PATCH v2 0/6] Add support for Texas Instruments MCRC64 engine
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- [PATCH 09/16] crypto: chacha20poly1305 - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/16] crypto: ccm - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/16] crypto: skcipher - Remove obsolete skcipher_alg helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/16] crypto: xts - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/16] crypto: lrw - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/16] crypto: hctr2 - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/16] crypto: gcm - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/16] crypto: cts - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/16] crypto: ctr - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/16] crypto: authencesn - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/16] crypto: authenc - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/16] crypto: adiantum - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/16] crypto: cryptd - Only access common skcipher fields on spawn
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/16] crypto: essiv - Handle lskcipher spawns
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/16] crypto: arc4 - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/16] crypto: skcipher - Add crypto_spawn_skcipher_alg_common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/16] crypto: Only use common fields on skcipher spawn algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: skcipher - Add dependency on ecb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pkcs7: remove md4 md5 x.509 support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] crypto: cbc - Convert from skcipher to lskcipher
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 05/12] crypto: akcipher - Support more than one signature encoding
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 06/12] crypto: ecdsa - Support P1363 signature encoding
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 03/12] X.509: Move certificate length retrieval into new helper
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: Move akcipher_request_cast helper to crypto header
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: qat - add pm_status debugfs file
- From: Lucas Segarra <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v2] qat: fix deadlock in backlog processing
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v5 01/11] dt-bindings: document generic access controller
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- [PATCH] crypto: qat - add namespace to driver
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [bug report] dm-crypt setup failure with next-20230929 kernel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug report] dm-crypt setup failure with next-20230929 kernel
- From: Shinichiro Kawasaki <shinichiro.kawasaki@xxxxxxx>
- Re: (subset) [PATCH v5 0/3] Meson S4 HW RNG Support
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- RE: [PATCH] crypto: Move akcipher_request_cast helper to crypto header
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- [PATCH] crypto: pkcs7: remove md4 md5 x.509 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: Move akcipher_request_cast helper to crypto header
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] crypto: qat: Annotate struct adf_fw_counters with __counted_by
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: CMake crypto_engine_exit() return void
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - increase size of buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - fix Chacha20 + Poly1305 self test failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: jitter - Offer compile-time options
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] hwrng: stm32: support STM32MP13x platforms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: crypto: ice: document the sa8775p inline crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: qat - add pm_status debugfs file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: akcipher - fix kernel-doc typos
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: sig - fix kernel-doc typo
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v3 2/2] hwrng: Add support for Nitro Secure Module
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v3 0/2] Add Nitro Secure Module support
- From: Alexander Graf <graf@xxxxxxxxxx>
- [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: Yureka <yuka@xxxxxxxx>
- Re: [PATCH v2] qat: fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH] crypto: qat: Annotate struct adf_fw_counters with __counted_by
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v5 02/11] dt-bindings: treewide: add access-controller description
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v5 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 08/11] arm64: dts: st: add RIFSC as an access controller for STM32MP25x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 11/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 09/11] bus: etzpc: introduce ETZPC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 05/11] firewall: introduce stm32_firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 06/11] of: property: fw_devlink: Add support for "access-controller"
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 04/11] dt-bindings: bus: document ETZPC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 07/11] bus: rifsc: introduce RIFSC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 02/11] dt-bindings: treewide: add access-controller description
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 03/11] dt-bindings: bus: document RIFSC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 00/11] Introduce STM32 Firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v5 01/11] dt-bindings: document generic access controller
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v2 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v2 2/2] hwrng: Add support for Nitro Secure Module
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v2 0/2] Add Nitro Secure Module support
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [IGNORE][PATCH v4 01/11] dt-bindings: Document common device controller bindings
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH v5 0/3] Meson S4 HW RNG Support
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v5 2/3] dt-bindings: rng: meson: add meson-rng-s4 compatible
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] drivers: rng: meson: add support for S4
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v5 3/3] arch/arm64: dts: meson-s4: add hwrng node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 1/2] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: Add support for Nitro Secure Module
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] hwrng: Add support for Nitro Secure Module
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH 1/2] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH 0/2] Add Nitro Secure Module support
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 11/12] PCI/CMA: Expose in sysfs whether devices are authenticated
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 10/12] PCI/CMA: Reauthenticate devices on reset and resume
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 09/12] PCI/CMA: Validate Subject Alternative Name in certificates
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 08/12] PCI/CMA: Authenticate devices on enumeration
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 06/12] crypto: ecdsa - Support P1363 signature encoding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 05/12] crypto: akcipher - Support more than one signature encoding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 03/12] X.509: Move certificate length retrieval into new helper
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 02/12] X.509: Parse Subject Alternative Name in certificates
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 01/12] X.509: Make certificate parser public
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v4 05/11] firewall: introduce stm32_firewall framework
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - check function qp num before alg register
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - fix the type value of aeq
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - fix PF queue parameter issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: Issue: padata: UAF in padata_serial_worker reproduce
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: x86/aesni - Perform address alignment early for XTS mode
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 1/3] crypto: x86/aesni - Refactor the common address alignment code
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 2/3] crypto: x86/aesni - Correct the data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 0/3] crypto: x86/aesni - Improve XTS data type
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- RE: Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2] padata: Fix the UAF issue related to parallel_data
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Issue: Can padata avoid dealing with CPU-related operations?
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH v6 09/11] firmware: imx: enable trng
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] padata: Fix the UAF issue related to parallel_data
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V4] crypto: qcom-rng - Add hw_random interface support
- From: Bjorn Andersson <quic_bjorande@xxxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- [PATCH V4] crypto: qcom-rng - Add hw_random interface support
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH] X.509: Add missing IMPLICIT annotations to AKID ASN.1 module
- From: Lukas Wunner <lukas@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]