Linux Crypto
[Prev Page][Next Page]
- [PATCH V2 3/4] dt-bindings: qcom-qce: add SoC compatible string for ipq9574
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 1/4] dt-bindings: clock: Add crypto clock and reset definitions
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- [PATCH V2 2/4] clk: qcom: gcc-ipq9574: Enable crypto clocks
- From: Anusha Rao <quic_anusha@xxxxxxxxxxx>
- Re: [PATCH 2/2] rust: add socket support
- From: Andrew Lunn <andrew@xxxxxxx>
- [PATCH v8 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v8 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 10/11] arch: Remove cmpxchg_double
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH v3 10/11] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 08/11] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 04/11] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 11/11] s390/cpum_sf: Convert to cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 02/11] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 07/11] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 03/11] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 06/11] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 09/11] mm/slub: Fold slab_update_freelist()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 05/11] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 01/11] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] rust: add synchronous message digest support
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH V6 21/21] MAINTAINERS: Add entry for drivers/acpi/riscv
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 20/21] RISC-V: Enable ACPI in defconfig
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 19/21] RISC-V: time.c: Add ACPI support for time_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 18/21] clocksource/timer-riscv: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 17/21] clocksource/timer-riscv: Refactor riscv_timer_init_dt()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 16/21] irqchip/riscv-intc: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 15/21] RISC-V: cpu: Enable cpuinfo for ACPI systems
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 14/21] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 13/21] RISC-V: only iterate over possible CPUs in ISA string parser
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 12/21] RISC-V: smpboot: Add ACPI support in setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 11/21] RISC-V: smpboot: Create wrapper setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 10/21] drivers/acpi: RISC-V: Add RHCT related code
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 09/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 08/21] RISC-V: Add ACPI initialization in setup_arch()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 07/21] ACPI: processor_core: RISC-V: Enable mapping processor to the hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 06/21] RISC-V: Add support to build the ACPI core
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 05/21] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 04/21] ACPI: tables: Print RINTC information when MADT is parsed
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 02/21] platform/surface: Disable for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 01/21] riscv: move sbi_init() earlier before jump_label_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V6 00/21] Add basic ACPI support for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] rust: networking and crypto abstractions
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH 2/2] rust: add socket support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- [PATCH 1/2] rust: add synchronous message digest support
- From: FUJITA Tomonori <tomo@xxxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V3 6/6] ARM: dts: imx6ul: Add clock and PGC node to GPC
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH V3 5/6] ARM: dts: imx: Adjust dma-apbh node name
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 2/2] crypto: hisilicon/advca - Add SHA support
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v2 1/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- [PATCH v2 0/2] crypto: hisilicon - Add HiSilicon ADVCA Subsystem
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andyhhp@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: engine - Fix struct crypto_engine_op doc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: octeontx2: hardware configuration for inline IPsec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: jitter - SHA-3 conditioner and test interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - silence uninitialized variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam - refactor RNG initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Alice Guo <alice.guo@xxxxxxx>
- Re: [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] crypto: starfive - Add crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sa2ul: change unsafe data size limit to 255 bytes
- From: Jayesh Choudhary <j-choudhary@xxxxxx>
- [PATCH] caam: imx: fix the built-in caam driver cannot match soc_id
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v4 4/4] RISC-V: crypto: add accelerated GCM GHASH implementation
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- Re: [PATCH v4 4/4] RISC-V: crypto: add accelerated GCM GHASH implementation
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v2 2/2] uacce: vma_close clears q->qfrs when freeing qfrs
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- [PATCH v2 1/2] uacce: use q->mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- [PATCH v2 0/2] uacce misc fix
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH 1/3] hwrng: imx-rngc - use bitfield macros to read fifo level
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: imx-rngc - use bitfield macros to read fifo level
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/sha256 - Use generic code from sha256_base
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/sha256 - Remove redundant and unused sha224_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] uacce: use filep->f_mapping to replace inode->i_mapping
- From: Zhangfei Gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] Crypto: Fix one bug when use kernel ecdsa algorithm
- From: yangmengfei1394@xxxxxxxxxxxxxx
- Re: [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/13] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Li Yang <leoyang.li@xxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 12/15] crypto: iaa - Add support for iaa_crypto deflate compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 06/15] dmaengine: idxd: Add wq private data accessors
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v4 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- RE: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- RE: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- RE: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH V5 21/21] MAINTAINERS: Add entry for drivers/acpi/riscv
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 20/21] RISC-V: Enable ACPI in defconfig
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 19/21] RISC-V: Add ACPI initialization in setup_arch()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 18/21] RISC-V: time.c: Add ACPI support for time_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 17/21] clocksource/timer-riscv: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 15/21] irqchip/riscv-intc: Add ACPI support
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 16/21] clocksource/timer-riscv: Refactor riscv_timer_init_dt()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 12/21] RISC-V: only iterate over possible CPUs in ISA string parser
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 11/21] RISC-V: smpboot: Add ACPI support in setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 13/21] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 14/21] RISC-V: cpu: Enable cpuinfo for ACPI systems
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 10/21] RISC-V: smpboot: Create wrapper setup_smp()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 09/21] drivers/acpi: RISC-V: Add RHCT related code
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 08/21] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 07/21] ACPI: processor_core: RISC-V: Enable mapping processor to the hartid
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 06/21] RISC-V: Add support to build the ACPI core
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 05/21] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 04/21] ACPI: tables: Print RINTC information when MADT is parsed
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 03/21] crypto: hisilicon/qm: Fix to enable build with RISC-V clang
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 02/21] platform/surface: Disable for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 01/21] riscv: move sbi_init() earlier before jump_label_init()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- [PATCH V5 00/21] Add basic ACPI support for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [syzbot] [crypto?] general protection fault in __aria_aesni_avx_gfni_crypt_16way
- From: syzbot <syzbot+a6abcf08bad8b18fd198@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.4
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 6.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH AUTOSEL 6.1 21/49] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.2 24/53] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.3 27/59] crypto: jitter - permanent and intermittent health errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 14/14] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 03/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] crypto: hash - Add default handlers for digest, export, import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash - Add default handlers for digest, export, import
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- [PATCH v7 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v7 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v7 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v7 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v7 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [v2 PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxx>
- [PATCH] hwrng: virtio - Fix race on data_avail and actual data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] KCSAN: data-race in random_recv_done / virtio_read (3)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Fix CRYPTO_USER checks for report function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: api - Fix CRYPTO_USER checks for report function
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [EXT] [PATCH] crypto: engine - fix crypto_queue backlog handling
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH V4 13/23] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH v3 06/15] dmaengine: idxd: Add private_data to struct idxd_wq
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 05/15] dmaengine: idxd: Export wq resource management functions
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v3 04/15] dmaengine: idxd: Export descriptor management functions
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v2 03/10] crypto: ccp: Add bootloader and TEE version offsets
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: [PATCH v2 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 01/10] crypto: ccp: Rename macro for security attributes
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] SUNRPC: Avoid relying on crypto API to derive CBC-CTS output IV
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 06/15] dmaengine: idxd: Add private_data to struct idxd_wq
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- Re: [PATCH v3 04/15] dmaengine: idxd: Export descriptor management functions
- From: Dave Jiang <dave.jiang@xxxxxxxxx>
- RE: [PATCH] SUNRPC: Avoid relying on crypto API to derive CBC-CTS output IV
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH] SUNRPC: Avoid relying on crypto API to derive CBC-CTS output IV
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- [PATCH] SUNRPC: Avoid relying on crypto API to derive CBC-CTS output IV
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH V4 13/23] RISC-V: cpufeature: Add ACPI support in riscv_fill_hwcap()
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: LEA block cipher implementation
- From: Letrhee <letrhee@xxxxxxxxx>
- Re: [PATCH v3 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Fenghua Yu <fenghua.yu@xxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: LEA block cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: LEA block cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v3 15/15] crypto: iaa - Add IAA Compression Accelerator stats
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 14/15] crypto: iaa - Add irq support for the crypto async interface
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 13/15] crypto: iaa - Add support for default IAA 'canned' compression mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 12/15] crypto: iaa - Add support for iaa_crypto deflate compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 11/15] crypto: iaa - Add compression mode management along with fixed mode
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 10/15] crypto: iaa - Add per-cpu workqueue table with rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 09/15] crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 08/15] crypto: iaa - Add IAA Compression Accelerator Documentation
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 07/15] dmaengine: idxd: add callback support for iaa crypto
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 02/15] dmaengine: idxd: add external module driver support for dsa_bus_type
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 06/15] dmaengine: idxd: Add private_data to struct idxd_wq
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 01/15] dmaengine: idxd: add wq driver name support for accel-config user tool
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 05/15] dmaengine: idxd: Export wq resource management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 04/15] dmaengine: idxd: Export descriptor management functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 00/15] crypto: Add Intel Analytics Accelerator (IAA) crypto compression driver
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v3 03/15] dmaengine: idxd: Export drv_enable/disable and related functions
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- [PATCH v2 07/10] crypto: ccp: Add support for getting and setting DBC parameters
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 06/10] crypto: ccp: Add support for setting user ID for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 05/10] crypto: ccp: Add support for fetching a nonce for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 03/10] crypto: ccp: Add bootloader and TEE version offsets
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 00/10] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 01/10] crypto: ccp: Rename macro for security attributes
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: LEA block cipher AVX2 optimization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- [PATCH 1/3] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH 0/3] crypto: LEA block cipher implementation
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH 2/3] crypto: add LEA testmgr tests
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- [PATCH 3/3] crypto: LEA block cipher AVX2 optimization
- From: Dongsoo Lee <letrhee@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: engine - fix crypto_queue backlog handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH RFC 01/43] x86/crypto: Adapt assembly for PIE support
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (3)
- From: syzbot <syzbot+a6d6b8fffa294705dbd8@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] hwrng: imx-rngc - use BIT(x) for register bit defines
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 0/3] hwrng: imx-rngc - simplify register definitions
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 1/3] hwrng: imx-rngc - use bitfield macros to read fifo level
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 2/3] hwrng: imx-rngc - use bitfield macros to read rng type
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [PATCH V4 08/23] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 05/23] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH V4 08/23] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 08/23] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 05/23] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH V4 08/23] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Sunil V L <sunilvl@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Implement GCM ghash using Zbc and Zbkb extensions
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v4 0/4] Implement GCM ghash using Zbc and Zbkb extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Implement GCM ghash using Zbc and Zbkb extensions
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v4 0/4] Implement GCM ghash using Zbc and Zbkb extensions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 5/5] Update Kconfig and Makefile.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 4/5] Glue code for optmized Poly1305 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 3/5] An optimized Poly1305 implementation with 4-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: Accelerated Chacha20/Poly1305 implementation
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH V4 10/23] RISC-V: smpboot: Create wrapper smp_setup()
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH V4 09/23] drivers/acpi: RISC-V: Add RHCT related code
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH V4 08/23] RISC-V: ACPI: Cache and retrieve the RINTC structure
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH V4 06/23] RISC-V: Add support to build the ACPI core
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [RFC][PATCH 3/6] verification: Introduce verify_umd_signature() and verify_umd_message_sig()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 3/6] verification: Introduce verify_umd_signature() and verify_umd_message_sig()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v8 34/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RFC v8 34/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH V4 05/23] ACPI: OSL: Make should_use_kmap() 0 for RISC-V
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH 00/10] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 00/10] Add dynamic boost control support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC][PATCH 4/6] bpf: Introduce bpf_verify_umd_signature() kfunc
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/6] verification: Introduce verify_umd_signature() and verify_umd_message_sig()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init)
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init)
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v6 2/4] crypto: starfive - Add crypto engine support
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: starfive - Add hash and HMAC support
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v6 2/4] crypto: starfive - Add crypto engine support
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- RE: [PATCH v3] crypto: caam - refactor RNG initialization
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v6 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v6 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v6 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v6 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v6 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/6] verification: Introduce verify_umd_signature() and verify_umd_message_sig()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 4/6] bpf: Introduce bpf_verify_umd_signature() kfunc
- From: Yonghong Song <yhs@xxxxxxxx>
- [RFC][PATCH 2/6] KEYS: asymmetric: Introduce UMD-based asymmetric key signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 3/6] verification: Introduce verify_umd_signature() and verify_umd_message_sig()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 1/6] KEYS: asymmetric: Introduce UMD-based asymmetric key parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 0/6] KEYS: Introduce user mode key and signature parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 5/6] selftests/bpf: Prepare a test for UMD-parsed signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 6/6] KEYS: asymmetric: Add UMD handler
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 4/6] bpf: Introduce bpf_verify_umd_signature() kfunc
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: octeontx2: hardware configuration for inline IPsec
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 1/2] crypto: octeontx2: add support for AF to CPT PF uplink mbox
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 0/2] crypto: octeontx2: hardware configuration for inline IPsec
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init)
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] Update Kconfig and Makefile.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] Glue code for optmized Poly1305 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [linux-next:pending-fixes] BUILD SUCCESS 0a6daccdbdd65cc86e2c4479211cd7f5915c9cd8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [Linux-stm32] [PATCH v3 6/6] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 5/5] Update Kconfig and Makefile.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] Glue code for optmized Poly1305 implementation for ppc64le.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- RE: [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v3] crypto: engine - Fix struct crypto_engine_op doc
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 0/5] crypto: Accelerated Chacha20/Poly1305 implementation
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 4/5] Glue code for optmized Poly1305 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 1/5] An optimized Chacha20 implementation with 8-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 2/5] Glue code for optmized Chacha20 implementation for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 3/5] An optimized Poly1305 implementation with 4-way unrolling for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 5/5] Update Kconfig and Makefile.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v3] crypto: engine - Fix struct crypto_engine_op doc
- From: David Yang <mmyangfl@xxxxxxxxx>
- [GIT PULL] Crypto Update for 6.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: engine - Fix struct crypto_engine_op doc
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2] crypto: engine - Fix struct crypto_engine_op doc
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH] crypto: engine - Fix typo in struct crypto_engine_op doc
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: engine - Fix typo in struct crypto_engine_op doc
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [syzbot] [crypto?] KCSAN: data-race in random_recv_done / virtio_read (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [syzbot] [crypto?] KCSAN: data-race in random_recv_done / virtio_read (3)
- From: syzbot <syzbot+726dc8c62c3536431ceb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Kconfig - Add HAS_IOMEM dependencies for exynos/meson/mtk/npcm
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [Linux-stm32] [PATCH v3 6/6] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Oleksii Moisieiev <Oleksii_Moisieiev@xxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - silence uninitialized variable warning
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: jitter - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: jitter - SHA-3 conditioner and test interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 20/22] crypto: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: Drop unneeded quotes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RFC v8 12/56] x86/sev: Add RMP entry lookup helpers
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH 07/10] crypto: ccp: Add support for getting and setting DBC parameters
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 00/10] Add dynamic boost control support
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 02/10] crypto: ccp: Add support for displaying PSP firmware versions
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 04/10] crypto: ccp: move setting PSP master to earlier in the init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 03/10] crypto: ccp: Add bootloader and TEE version offsets
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 06/10] crypto: ccp: Add support for setting user ID for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 01/10] crypto: ccp: Rename macro for security attributes
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 05/10] crypto: ccp: Add support for fetching a nonce for dynamic boost control
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH] crypto: engine - fix crypto_queue backlog handling
- From: Olivier Bacon <olivierb89@xxxxxxxxx>
- Re: [PATCH v5] crypto: hisilicon/trng - add support for HiSTB TRNG
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v9 0/2] Use CCP driver to handle PSP I2C arbitration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Add some test vectors for cmac(camellia)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/13] crypto: x86 - avoid absolute references
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash - Make crypto_ahash_alg helper available
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash - Add statesize to crypto_ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha512-neon - Fix clang function cast warnings
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RPCSEC GSS krb5 KUnit test fails on arm64 with h/w accelerated ciphers enabled
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha256-neon - Fix clang function cast warnings
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha1-neon - Fix clang function cast warnings
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - silence uninitialized variable warning
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH V4 23/23] crypto: hisilicon/qm: Workaround to enable build with RISC-V clang
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] crypto: ixp4xx - silence uninitialized variable warning
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: arm/sha512-neon - Fix clang function cast warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm/sha256-neon - Fix clang function cast warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm/sha1-neon - Fix clang function cast warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hwrng: Kconfig - Add HAS_IOMEM dependencies for exynos/meson/mtk/npcm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 1/4] crypto: api - Fix built-in testing dependency failures
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- [PATCH 6.2 092/139] asymmetric_keys: log on fatal failures in PE/pkcs7
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.2 091/139] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.1 085/134] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.1 086/134] asymmetric_keys: log on fatal failures in PE/pkcs7
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 45/91] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 46/91] asymmetric_keys: log on fatal failures in PE/pkcs7
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 092/124] asymmetric_keys: log on fatal failures in PE/pkcs7
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 091/124] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 68/92] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 69/92] asymmetric_keys: log on fatal failures in PE/pkcs7
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto: cryptd - Convert hash to use modern init_tfm/exit_tfm
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: hash - Add crypto_clone_ahash/shash
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: api - Add crypto_clone_tfm
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: api - Add crypto_tfm_get
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- [PATCH 4.19 45/57] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 30/37] verify_pefile: relax wrapper length check
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 1/4] crypto: api - Fix built-in testing dependency failures
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH v3] crypto: caam - refactor RNG initialization
- From: meenakshi.aggarwal@xxxxxxx
- Re: [PATCH RFC v8 20/56] crypto:ccp: Define the SEV-SNP commands
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH RFC v8 45/56] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH V2 3/6] dt-bindings: imx-thermal: add imx6sll and imx6ul compatible
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 5.10 1/4] crypto: api - Fix built-in testing dependency failures
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 4/4] crypto: api - Fix boot-up crash when crypto manager is disabled
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH 5.10 2/4] crypto: api - Do not create test larvals if manager is disabled
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH 5.10 3/4] crypto: api - Export crypto_boot_test_finished
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH 5.10 1/4] crypto: api - Fix built-in testing dependency failures
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH 5.10 0/4] Fix built-in testing dependency failures
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- RE: [PATCH v9 2/2] i2c: designware: Add doorbell support for Mendocino
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH v9 2/2] i2c: designware: Add doorbell support for Mendocino
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] firmware_loader: rework crypto dependencies
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] ixp4xx_crypto: fix building wiht 64-bit dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/2] i2c: designware: Use PCI PSP driver for communication
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v9 2/2] i2c: designware: Add doorbell support for Mendocino
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v9 0/2] Use CCP driver to handle PSP I2C arbitration
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2 1/2] Remove POWER10_CPU dependency.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] Move Power10 feature, PPC_MODULE_FEATURE_P10.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] Remove POWER10_CPU dependency.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 0/2] No access to CAAM page 0 registers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] Use CCP driver to handle PSP I2C arbitration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Don't initialize CCP for PSP 0x1649
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH V3 5/6] ARM: dts: imx: Adjust dma-apbh node name
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V3 4/6] dt-bindings: imxgpt: add imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH] firmware_loader: rework crypto dependencies
- From: Amadeusz Sławiński <amadeuszx.slawinski@xxxxxxxxxxxxxxx>
- [PATCH V3 1/6] dt-bindings: serial: fsl-imx-uart: add missing properties
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V3 2/6] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V3 6/6] ARM: dts: imx6ul: Add clock and PGC node to GPC
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V3 0/6] ARM: dts: imx6ull: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V3 3/6] dt-bindings: imx-thermal: add imx6sll and imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH] firmware_loader: rework crypto dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] ixp4xx_crypto: fix building wiht 64-bit dma_addr_t
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] firmware_loader: rework crypto dependencies
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] Support ACPI PSP on Hyper-V
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - Do not check word size when compile testing
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH v2 2/2] Move Power10 feature, PPC_MODULE_FEATURE_P10.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 1/2] Remove POWER10_CPU dependency.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 0/2] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH] crypto: Add some test vectors for cmac(camellia)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] sunrpc: Fix RFC6803 encryption test
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] sunrpc: Fix RFC6803 encryption test
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] sunrpc: Fix RFC6803 encryption test
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] sunrpc: Fix RFC6803 encryption test
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/6] crypto: hash - Add crypto_clone_ahash/shash
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: cryptd - Add support for cloning hashes
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: cryptd - Convert hash to use modern init_tfm/exit_tfm
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: hmac - Add support for cloning
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: api - Add crypto_clone_tfm
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: api - Add crypto_tfm_get
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: api - Add support for cloning tfms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- RE: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Leo Li <leoyang.li@xxxxxxx>
- Re: [PATCH v2 00/13] crypto: x86 - avoid absolute references
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] Remove POWER10_CPU dependency and move PPC_MODULE_FEATURE_P10.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 7d8214bba44c1aa6a75921a09a691945d26a8d43
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: Did the in-kernel Camellia or CMAC crypto implementation break?
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v8 0/6] Use CCP driver to handle PSP I2C arbitration
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Did the in-kernel Camellia or CMAC crypto implementation break?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 05/11] dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v6 00/11] arm64: qcom: Enable Crypto Engine for a few Qualcomm SoCs
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- [PATCH v2 12/13] crypto: x86/crc32 - Use local .L symbols for code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 13/13] crypto: x86/sha - Use local .L symbols for code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 11/13] crypto: x86/aesni - Use local .L symbols for code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 10/13] crypto: x86/sha256 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 09/13] crypto: x86/ghash - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 08/13] crypto: x86/des3 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 07/13] crypto: x86/crc32c - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 06/13] crypto: x86/cast6 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 05/13] crypto: x86/cast5 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 04/13] crypto: x86/camellia - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 03/13] crypto: x86/aria - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 02/13] crypto: x86/aesni - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 01/13] crypto: x86/aegis128 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 00/13] crypto: x86 - avoid absolute references
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH v3 2/2] crypto: caam - OP-TEE firmware support
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- RE: [PATCH v3 1/2] crypto: caam - reduce page 0 regs access to minimum
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- RE: [PATCH v2] crypto: caam - refactor RNG initialization
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH RFC v8 17/56] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 0/8] Support ACPI PSP on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] RISC-V: crypto: add accelerated GCM GHASH implementation
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH V4 23/23] crypto: hisilicon/qm: Workaround to enable build with RISC-V clang
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v5 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH V2 4/6] dt-bindings: imxgpt: add imx6ul compatible
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V2 3/6] dt-bindings: imx-thermal: add imx6sll and imx6ul compatible
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V2 2/6] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V2 1/6] dt-bindings: serial: fsl-imx-uart: add missing properties
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V2 6/6] ARM: dts: imx6ul: Add clock and PGC node to GPC
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [RFC PATCH] fsverity: use shash API instead of ahash API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v6 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 10/12] crypto: x86/aes - Prepare for a new AES implementation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 12/12] crypto: x86/aes-kl - Support XTS mode
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 11/12] crypto: x86/aes-kl - Support AES algorithm using Key Locker instructions
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 07/12] x86/cpu/keylocker: Load an internal wrapping key at boot-time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 06/12] x86/keylocker: Define Key Locker CPUID leaf
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 05/12] x86/msr-index: Add MSRs for Key Locker internal wrapping key
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 04/12] x86/asm: Add a wrapper function for the LOADIWKEY instruction
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 03/12] x86/insn: Add Key Locker instructions to the opcode map
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 09/12] x86/cpu: Add a configuration and command line option for Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 02/12] x86/cpufeature: Enumerate Key Locker feature
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 01/12] Documentation/x86: Document Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 00/12] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: jitter - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: jitter - SHA-3 conditioner and test interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH V2 5/6] ARM: dts: imx: Adjust dma-apbh node name
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 0/6] ARM: dts: imx6ull: Fix dtbs_check warnings
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 4/6] dt-bindings: imxgpt: add imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 3/6] dt-bindings: imx-thermal: add imx6sll and imx6ul compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 6/6] ARM: dts: imx6ul: Add clock and PGC node to GPC
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 2/6] dt-bindings: crypto: fsl-dcp: add imx6sl and imx6ull compatible
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH V2 1/6] dt-bindings: serial: fsl-imx-uart: add missing properties
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
- From: David Yang <mmyangfl@xxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86 - avoid absolute references
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] crypto: starfive - Add hash and HMAC support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v4 2/4] crypto: starfive - Add crypto engine support
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v4 3/4] riscv: dts: starfive: Add crypto and DMA node for VisionFive 2
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: starfive - Add drivers for crypto engine
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v4 1/4] dt-bindings: crypto: Add StarFive crypto module
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- [PATCH] crypto: ixp4xx - Do not check word size when compile testing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5] crypto: hisilicon/trng - add support for HiSTB TRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 2/3] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v7 3/3] mmc: sdhci-msm: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v7 2/3] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v7 0/3] Add dedicated Qcom ICE driver
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v7 1/3] dt-bindings: ufs: qcom: Add ICE phandle
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- Re: [PATCH v5] crypto: hisilicon/trng - add support for HiSTB TRNG
- From: Yangfl <mmyangfl@xxxxxxxxx>
- Re: [PATCH 00/10] crypto: x86 - avoid absolute references
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 10/10] crypto: x86/sha256 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 09/10] crypto: x86/ghash - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 08/10] crypto: x86/des3 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 06/10] crypto: x86/cast6 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 07/10] crypto: x86/crc32c - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 05/10] crypto: x86/cast5 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 04/10] crypto: x86/camellia - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 03/10] crypto: x86/aria - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 02/10] crypto: x86/aesni - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 01/10] crypto: x86/aegis128 - Use RIP-relative addressing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 00/10] crypto: x86 - avoid absolute references
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: ixp4xx - Remove COMPILE_TEST from Kconfig dependencies
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master 99/105] include/linux/compiler_types.h:397:45: error: call to '__compiletime_assert_385' declared with attribute error: BUILD_BUG_ON failed: sizeof(struct crypt_ctl) != 64
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: (subset) [PATCH v6 0/6] Add dedicated Qcom ICE driver
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v6 0/6] Add dedicated Qcom ICE driver
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v6 6/6] arm64: dts: qcom: sm8550: Add the Inline Crypto Engine node
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v6 3/6] soc: qcom: Make the Qualcomm UFS/SDCC ICE a dedicated driver
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v5 4/6] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 2/6] dt-bindings: ufs: qcom: Add ICE phandle
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 1/2] crypto: jitter - replace LFSR with SHA3-256
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: jitter - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: jitter - SHA-3 conditioner and test interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v6 6/6] arm64: dts: qcom: sm8550: Add the Inline Crypto Engine node
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 5/6] mmc: sdhci-msm: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 4/6] scsi: ufs: ufs-qcom: Switch to the new ICE API
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 3/6] soc: qcom: Make the Qualcomm UFS/SDCC ICE a dedicated driver
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 2/6] dt-bindings: ufs: qcom: Add ICE phandle
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 1/6] dt-bindings: crypto: Add Qualcomm Inline Crypto Engine
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
- [PATCH v6 0/6] Add dedicated Qcom ICE driver
- From: Abel Vesa <abel.vesa@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]