Linux Crypto
[Prev Page][Next Page]
- [PATCH] crypto: caam - adjust RNG timing to support more devices
- From: meenakshi.aggarwal@xxxxxxx
- RE: [PATCH v2 1/5] crypto:caam - avoid allocating memory at crypto request runtime for skcipher
- From: Meenakshi Aggarwal <meenakshi.aggarwal@xxxxxxx>
- [PATCH RFC v9 05/51] x86/coco: move CONFIG_HAS_CC_PLATFORM check down into coco/Makefile
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 06/51] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 07/51] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 49/51] x86/sev: Add KVM commands for per-instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 50/51] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 04/51] KVM: x86: Determine shared/private faults using a configurable mask
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 51/51] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 48/51] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 45/51] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 46/51] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 43/51] KVM: SEV: Configure MMU to check for private fault flags
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 44/51] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 47/51] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 03/51] KVM: x86: Use full 64-bit error code for kvm_mmu_do_page_fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 41/51] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 42/51] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 40/51] KVM: SVM: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 39/51] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 34/51] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 36/51] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 38/51] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 37/51] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 35/51] KVM: SVM: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 32/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 33/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 02/51] KVM: x86: Add gmem hook for invalidating private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 31/51] KVM: Split out memory attribute xarray updates to helper function
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 30/51] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 29/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 27/51] KVM: SVM: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 28/51] KVM: SVM: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 26/51] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 25/51] KVM: SVM: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 24/51] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 21/51] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 23/51] KVM: SEV: Select CONFIG_KVM_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 01/51] KVM: x86: Add gmem hook for initializing private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 22/51] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 20/51] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 17/51] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 19/51] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 18/51] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 14/51] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 16/51] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 13/51] x86/fault: Handle RMP page faults for user addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 15/51] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 12/51] x86/fault: Report RMP page faults for kernel addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 09/51] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 10/51] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 11/51] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] crypto: fcrypt: Fix block comment
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2] crypto: fcrypt: Fix block comment
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- Re: [linux-next:master] [crypto] bb897c5504: stress-ng.af-alg.ops_per_sec -8.0% regression
- From: Oliver Sang <oliver.sang@xxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: arm - add some missing SPDX headers
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 0/3] crypto - some SPDX cleanups for arch code
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] virtio_console: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto - some SPDX cleanups for arch code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto:caam - avoid allocating memory at crypto request runtime for skcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: intel,ixp4xx: drop unneeded quotes
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: qat - do not export adf_init_admin_pm()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: intel,ixp4xx: drop unneeded quotes
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] crypto: n2: Use of_property_read_reg() to parse "reg"
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: qat - expose pm_idle_enabled through sysfs
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- [PATCH 3/4] crypto: qat - refactor fw config logic for 4xxx
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 2/4] crypto: qat - make fw images name constant
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 4/4] crypto: qat - extend configuration for 4xxx
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 1/4] crypto: qat - move returns to default case
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 0/4] crypto: qat - extend configuration for 4xxx
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- Re: [PATCH v2 5/12] percpu: Add {raw,this}_cpu_try_cmpxchg()
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v2 5/12] percpu: Add {raw,this}_cpu_try_cmpxchg()
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 5/12] percpu: Add {raw,this}_cpu_try_cmpxchg()
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH 2/3] virtio_console: fixup potential cpu stall when free unused bufs
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [PATCH] dt-bindings: crypto: intel,ixp4xx: drop unneeded quotes
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] virtio_console: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] virtio_bt: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [PATCH 1/3] virtio-crypto: fixup potential cpu stall when free unused bufs
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [PATCH 0/3] fixup potential cpu stall
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [RESEND] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- RE: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [linux-next:master] [crypto] bb897c5504: stress-ng.af-alg.ops_per_sec -8.0% regression
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: caam/qi2 - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v2 3/5] crypto: caam - avoid allocating memory at crypto request runtime for hash
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v2 4/5] crypto: caam/qi - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v2 2/5] crypto:caam - avoid allocating memory at crypto request runtime for aead
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v2 1/5] crypto:caam - avoid allocating memory at crypto request runtime for skcipher
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v2 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH net-next 2/6] algif: Remove hash_sendpage*()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - set deprecated capabilities as reserved
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - update slice mask for 4xxx devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add internal timer for qat 4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: starfive - Add RSA algo support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [linux-next:master] [crypto] bb897c5504: stress-ng.af-alg.ops_per_sec -8.0% regression
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH] docs: crypto: async-tx-api: fix typo in struct name
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH v4 11/11] crypto: ccp: Add Mario to MAINTAINERS
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 05/11] crypto: ccp: Add support for fetching a nonce for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 04/11] crypto: ccp: move setting PSP master to earlier in the init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 01/11] crypto: ccp: Rename macro for security attributes
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 07/11] crypto: ccp: Add support for getting and setting DBC parameters
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 03/11] crypto: ccp: Add bootloader and TEE version offsets
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 08/11] crypto: ccp: Add a sample library for ioctl use
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 10/11] crypto: ccp: Add unit tests for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 06/11] crypto: ccp: Add support for setting user ID for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 09/11] crypto: ccp: Add a sample python script for Dynamic Boost Control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 02/11] crypto: ccp: Add support for displaying PSP firmware versions
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 00/11] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH net-next v3 00/10] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- RE: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 3/8] crypto: drbg: Convert dual BSD 3-Clause/GPL-1.0 license boilerplate to SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v8 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH V4 2/2] dt-bindings: imxgpt: add imx6ul compatible
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V4 1/2] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/8] crypto: drbg: Convert dual BSD 3-Clause/GPL-1.0 license boilerplate to SPDX identifier
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- Re: [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- Re: [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- Re: [PATCH net-next v3 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 09/10] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 07/10] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 06/10] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 05/10] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: qat - unmap buffers before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: qat - add fw_counters debugfs file
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] crypto: crct10dif_common Add SPDX-License-Identifier tag
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 7/8] crypto: ecrdsa: Remove GPL 2.0+ boilerplate
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 1/8] crypto: Convert dual BSD 3-Clause/GPL 2.0 boilerplate to SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 6/8] crypto: Replace GPL 2.0 boilerplate with SPDX license identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 8/8] crypto: cts: Convert MIT boilerplate to corresponding SPDX license identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 5/8] crypto: streebog_generic: Correct SPDX license identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 3/8] crypto: drbg: Convert dual BSD 3-Clause/GPL-1.0 license boilerplate to SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 4/8] crypto: ecc: Replace BSD 2-Clause license boilerplate with SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 2/8] crypto: fcrypt: Replace dual BSD 3-Clause/GPL 2.0+ boilerplate with SPDX identifier
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 0/8] SPDX conversion for cryptographic algorithms
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v8 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto - some SPDX cleanups for arch code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: crct10dif_common Add SPDX-License-Identifier tag
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v2] crypto: crct10dif_common Add SPDX-License-Identifier tag
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: x86 - add some missing SPDX headers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] crypto - some SPDX cleanups for arch code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] crypto: arm - add some missing SPDX headers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] crypto: arm64 - add some missing SPDX headers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH net-next v3 05/10] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 06/10] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 01/10] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 00/10] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 03/10] Wrap lines at 80
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 09/10] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 04/10] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 02/10] Fix a couple of spelling mistakes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 07/10] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v3 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: crct10dif_common Add SPDX-License-Identifier tag
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] crypto: md4: Fix checkpatch issues
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] crypto: md4: Fix checkpatch issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: md4: Fix checkpatch issues
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] crypto: frcypt Fix checkpatch warnings
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] crypto: Fix checkpatch issues
- From: Franziska Näpelt <franziska.naepelt@xxxxxxxxxxxxxx>
- [PATCH] crypto: md4: Fix checkpatch issues
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- [PATCH] crypto: hmac: Fix missing blank line
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- [PATCH] crypto: frcypt Fix checkpatch warnings
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- [PATCH] crypto: crct10dif_common Add SPDX-License-Identifier tag
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 01/10] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix checkpatch issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: hisilicon/advca - Add SHA support
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v4 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v4 0/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v8 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] crypto: qat - add missing function declaration in adf_dbgfs.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/12] Documentation/x86: Document Key Locker
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RESEND 2/2] crypto: qat - unmap buffers before free for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RESEND 1/2] crypto: qat - unmap buffer before free for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RESEND 0/2] crypto: qat - unmap buffers before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v6 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 13/15] crypto: iaa - Add support for deflate-iaa-canned compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 12/15] crypto: iaa - Add support for deflate-iaa compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v6 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: qat - fix adf_dbgfs_exit() typo
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: qat - fix adf_dbgfs_exit() typo
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH v8 01/12] Documentation/x86: Document Key Locker
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 01/12] Documentation/x86: Document Key Locker
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Wolfram Sang <wsa@xxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v8 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- linux-next: duplicate patch in the vhost tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v8 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v8 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 11/12] crypto: x86/aes - Prepare for a new AES-XTS implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 06/12] x86/keylocker: Define Key Locker CPUID leaf
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 07/12] x86/cpu/keylocker: Load a wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 08/12] x86/PM/keylocker: Restore the wrapping key on the resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 02/12] x86/cpufeature: Enumerate Key Locker feature
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 00/12] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 04/12] x86/asm: Add a wrapper function for the LOADIWKEY instruction
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 03/12] x86/insn: Add Key Locker instructions to the opcode map
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v8 05/12] x86/msr-index: Add MSRs for Key Locker wrapping key
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH] crypto: Fix checkpatch issues
- From: Franziska Naepelt <franziska.naepelt@xxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - add missing function declaration in adf_dbgfs.h
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 45/47] drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c:69:9: error: implicit declaration of function 'adf_dbgfs_exit'; did you mean 'adf_dbgfs_init'?
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 45/47] drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c:69:9: error: implicit declaration of function 'adf_dbgfs_exit'; did you mean 'adf_dbgfs_init'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: (subset) [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - move dbgfs init to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitter - correct health test during initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: cn10k: Add extended trng register support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] New hardware support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto module : rearrange the default functions of akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 0/2] crypto: starfive - Add RSA algo to drivers
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: starfive - Update hash module irq handling
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Sam James <sam@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 4/7] dt-bindings: crypto: fsl-dcp: Add i.MX6SL, i.MX6SLL, and i.MX6ULL support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 3/7] dt-bindings: timer: gpt: Support 3rd clock for i.MX6DL
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 2/7] dt-bindings: timer: gpt: Add i.MX6UL support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] [RFC] ubsan: disallow bounds checking with gcov on broken gcc
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - add fw_counters debugfs file
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Helge Deller <deller@xxxxxx>
- [PATCH v1 7/7] dt-bindings: input: touchscreen: edt-ft5x06: Add 'threshold' property
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 3/7] dt-bindings: timer: gpt: Support 3rd clock for i.MX6DL
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 4/7] dt-bindings: crypto: fsl-dcp: Add i.MX6SL, i.MX6SLL, and i.MX6ULL support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 2/7] dt-bindings: timer: gpt: Add i.MX6UL support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 5/7] dt-bindings: clock: imx6ul: Support optional enet*_ref_pad clocks
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 0/7] Add support for various features to i.MX6 bindings
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 1/7] dt-bindings: mmc: fsl-imx-esdhc: Add imx6ul support
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v1 6/7] dt-bindings: clock: imx6q: Allow single optional clock and add enet_ref_pad
- From: Oleksij Rempel <o.rempel@xxxxxxxxxxxxxx>
- [PATCH v2 07/12] parisc/percpu: Work around the lack of __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: qat - unmap buffers before free for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 0/2] crypto: qat - unmap buffers before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - unmap buffer before free for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] crypto: qat - add internal timer for qat 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 5/7] crypto: update some Arm documentation references
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: How to get my krb5 crypto lib upstream?
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- How to get my krb5 crypto lib upstream?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 08/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 06/12] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 02/12] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 01/12] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 10/12] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 07/12] percpu: #ifndef __SIZEOF_INT128__
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 03/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 05/12] percpu: Add {raw,this}_cpu_try_cmpxchg()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 11/12] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 09/12] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 12/12] s390/cpum_sf: Convert to cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 04/12] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Leo Li <leoyang.li@xxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH net-next v2 02/10] Fix a couple of spelling mistakes
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - update slice mask for 4xxx devices
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - set deprecated capabilities as reserved
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH net-next v2 08/10] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 09/10] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 10/10] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 06/10] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 07/10] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 03/10] Wrap lines at 80
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 05/10] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 01/10] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 04/10] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 02/10] Fix a couple of spelling mistakes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next v2 00/10] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH V4 0/2] dt-bindings: imx: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V4 1/2] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V4 2/2] dt-bindings: imxgpt: add imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- build failure in crypto/twofish_common.c
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH] virt: sev-guest: fix kconfig warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2 5/7] crypto: update some Arm documentation references
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.4
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] docs: crypto: async-tx-api: fix typo in struct name
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Joan Bruguera Micó <joanbrugueram@xxxxxxxxx>
- Re: build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Joan Bruguera Micó <joanbrugueram@xxxxxxxxx>
- Re: [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH net-next 2/8] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: (subset) [PATCH v8 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto/pcrypt: Do not use isolated CPUs for callback
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/advca - Add SHA support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v8 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- [PATCH v8 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 10/11] arm64: dts: qcom: sm8350: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 06/11] dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 04/11] arm64: dts: qcom: sdm845: Fix the slimbam DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 03/11] arm64: dts: qcom: sdm8550: Fix the BAM DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 02/11] dt-bindings: dma: Increase iommu maxItems for BAM DMA
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v8 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH] crypto: qat - move dbgfs init to separate file
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH V4 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V4 0/4] Enable crypto for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH net-next 3/8] crypto: af_alg: Pin pages rather than ref'ing if appropriate
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 7/8] crypto: af_alg: Convert af_alg_sendpage() to use MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 8/8] crypto: af_alg/hash: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 1/8] Move netfs_extract_iter_to_sg() to lib/scatterlist.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 6/8] crypto: af_alg: Support MSG_SPLICE_PAGES
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 4/8] crypto: af_alg: Use extract_iter_to_sg() to create scatterlists
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 5/8] crypto: af_alg: Indent the loop in af_alg_sendmsg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 2/8] Drop the netfs_ prefix from netfs_extract_iter_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH net-next 0/8] crypto, splice, net: Make AF_ALG handle sendmsg(MSG_SPLICE_PAGES)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Meenakshi Aggarwal <meenakshi.aggarwal@xxxxxxx>
- Re: [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- [PATCH] crypto: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH] crypto: jitter - correct health test during initialization
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: hisilicon/advca - Add SHA support
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v3 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v3 0/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: add LEA testmgr tests
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 1/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH v2 0/2] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 12/12] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 11/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 10/12] crypto: x86/aesni - Use the proper data type in struct aesni_xts_ctx
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 07/12] x86/cpu/keylocker: Load a wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 08/12] x86/PM/keylocker: Restore the wrapping key on the resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 05/12] x86/msr-index: Add MSRs for Key Locker wrapping key
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 04/12] x86/asm: Add a wrapper function for the LOADIWKEY instruction
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 06/12] x86/keylocker: Define Key Locker CPUID leaf
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 02/12] x86/cpufeature: Enumerate Key Locker feature
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 03/12] x86/insn: Add Key Locker instructions to the opcode map
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v7 00/12] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/11] mm/slub: Fold slab_update_freelist()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- RE: [EXT] Re: [PATCH] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- build error while building arch/x86/purgatory/sha256.o: invalid 'asm': operand is not a condition code [...]
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: imx-rngc - two simple cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] hwrng: imx-rngc - simplify register definitions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis: add header for internal prototypes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] hwrng: cn10k: Add extended trng register support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/5] crypto: caam/qi2 - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 2/5] crypto:caam - avoid allocating memory at crypto request runtime for aead
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 4/5] crypto: caam/qi - avoid allocating memory at crypto request runtime
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 1/5] crypto:caam - avoid allocating memory at crypto request runtime for skcipher
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 3/5] crypto: caam - avoid allocating memory at crypto request runtime for hash
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH 0/5] Remove CRYPTO_ALG_ALLOCATES_MEMORY flag
- From: meenakshi.aggarwal@xxxxxxx
- Re: [PATCH V6 09/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Fix type mismatch warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH] crypto: starfive - Depend on AMBA_PL08X instead of selecting it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6.1] crypto: testmgr - fix RNG performance in fuzz tests
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v8 2/4] crypto: starfive - Add crypto engine support
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH V3 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: bhupesh.sharma@xxxxxxxxxx
- Re: [PATCH] crypto: starfive - Fix driver dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Crypto module : rearrange the default functions of akcipher
- From: yangmengfei1394 <yangmengfei1394@xxxxxxxxxxxxxx>
- Re: [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fsverity: use shash API instead of ahash API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto/Kconfig: warn about performance overhead of CRYPTO_STATS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: use shash API instead of ahash API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] powerpc/crypto: fix build warnings when DEBUG_FS is not enabled
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v7 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 11/11] arm64: dts: qcom: sm8450: add crypto nodes
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 10/11] arm64: dts: qcom: sm8350: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 06/11] dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 04/11] arm64: dts: qcom: sdm845: Fix the slimbam DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 02/11] dt-bindings: dma: Increase iommu maxItems for BAM DMA
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 01/11] dt-bindings: dma: Add support for SM6115 and QCM2290 SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 03/11] arm64: dts: qcom: sdm8550: Fix the BAM DMA engine compatible string
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v7 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Yangfl <mmyangfl@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- [PATCH v3 08/10] crypto: ccp: Add a sample script for Dynamic Boost Control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 10/10] crypto: ccp: Add Mario to MAINTAINERS
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 00/10] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 07/10] crypto: ccp: Add support for getting and setting DBC parameters
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 06/10] crypto: ccp: Add support for setting user ID for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 05/10] crypto: ccp: Add support for fetching a nonce for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 03/10] crypto: ccp: Add bootloader and TEE version offsets
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 09/10] crypto: ccp: Add unit tests for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 01/10] crypto: ccp: Rename macro for security attributes
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Validate that platform access mailbox registers are declared
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/3] New hardware support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Add support for PCI device 0x17E0
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 3/3] crypto: ccp - Add support for PCI device 0x156E
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 5/7] crypto: update some Arm documentation references
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH 1/2] hwrng: imx-rngc - mark the probe function as __init
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 2/2] hwrng: imx-rngc - don't init of_device_id's data
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 0/2] hwrng: imx-rngc - two simple cleanups
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 3/3] hwrng: imx-rngc - use BIT(x) for register bit defines
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 2/3] hwrng: imx-rngc - use bitfield macros to read rng type
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 1/3] hwrng: imx-rngc - simpler check for available random bytes
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v2 0/3] hwrng: imx-rngc - simplify register definitions
- From: Martin Kaiser <martin@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/23] arch/arm64/crypto/sha256-glue.c:18:20: error: expected declaration specifiers or '...' before string constant
- From: kernel test robot <lkp@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 21/22] drivers/dma/pl330.c:1053:13: error: '_start' redeclared as different kind of symbol
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: cmac - Add support for cloning
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- [PATCH] crypto: starfive - Fix driver dependencies
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: cipher - Add crypto_clone_cipher
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64/sha256-glue - Include module.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/22] arch/arm64/crypto/sha256-glue.c:18:20: error: expected parameter declarator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: api - Include moduleparam.h in algapi.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master 17/22] arch/arm64/crypto/sha256-glue.c:194:1: warning: data definition has no type or storage class
- From: kernel test robot <lkp@xxxxxxxxx>
- [herbert-cryptodev-2.6:master 21/22] drivers/tty/serial/amba-pl011.c:379:30: error: implicit declaration of function 'phys_to_page'; did you mean 'pfn_to_page'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v6 09/11] arm64: dts: qcom: sm8250: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 08/11] arm64: dts: qcom: sm8150: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH v6 07/11] arm64: dts: qcom: sm6115: Add Crypto Engine support
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: cmac - Add cloning support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- [PATCH] crypto: shash - Allow cloning on algorithms with no init_tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: cmac - Add support for cloning
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sa2ul: change unsafe data size limit to 255 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto: Fix one bug when use kernel ecdsa algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: cipher - Add crypto_clone_cipher
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: cmac - Add support for cloning
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: cmac - Use modern init_tfm/exit_tfm
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: cmac - Add cloning support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 0/6] ARM: dts: imx6ull: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V3 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V3 0/4] Enable crypto for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Michal Simek <michal.simek@xxxxxxx>
- [PATCH] hwrng: cn10k: Add extended trng register support
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Jassi Brar <jassisinghbrar@xxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v5 06/15] dmaengine: idxd: Add wq private data accessors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- [PATCH v5 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 12/15] crypto: iaa - Add support for iaa_crypto deflate compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v5 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH] crypto: aegis: add header for internal prototypes
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Wedson Almeida Filho <wedsonaf@xxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH] dt-bindings: xilinx: Switch xilinx.com emails to amd.com
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Andrew Lunn <andrew@xxxxxxx>
- async import/export for ahash
- From: Simon Richter <Simon.Richter@xxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Canchi <quic_anusha@xxxxxxxxxxx>
- [PATCH 1/2] crypto: starfive - Update hash module irq handling
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: starfive - Add RSA algo support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: starfive - Add RSA algo to drivers
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH v2] fsverity: use shash API instead of ahash API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6.1] crypto: testmgr - fix RNG performance in fuzz tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 3/3] crypto: LEA block cipher AVX2 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- RE: [PATCH 0/3] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH V2 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V2 4/4] arm64: dts: qcom: ipq9574: Enable crypto nodes
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]