Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v3 0/8] crypto: skcipher_walk cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/6] dt-bindings: crypto: qcom,inline-crypto-engine: Document the SM8750 ICE
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/6] dt-bindings: crypto: qcom,prng: Document SM8750 RNG
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH 1/6] dt-bindings: crypto: qcom-qce: Document the SM8750 crypto engine
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2] crypto: Use str_enable_disable-like helpers
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH v2] crypto: Use str_enable_disable-like helpers
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [RESEND PATCH V3] lib: 842: Improve error handling in sw842_compress()
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v1 3/3] misc: ls6000se-sdf: Add driver for Loongson 6000SE SDF
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v11 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v11 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v11 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v10 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v2 3/3] padata: avoid UAF for reorder_work
- From: chenridong <chenridong@xxxxxxxxxx>
- RE: [v3 PATCH] rhashtable: Fix rhashtable_try_insert test
- From: Michael Kelley <mhklinux@xxxxxxxxxxx>
- Re: [PATCH] crypto: Use str_enable_disable-like helpers
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: Use str_enable_disable-like helpers
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 3/3] misc: ls6000se-sdf: Add driver for Loongson 6000SE SDF
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH v1 3/3] misc: ls6000se-sdf: Add driver for Loongson 6000SE SDF
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v1 2/3] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v1 3/3] misc: ls6000se-sdf: Add driver for Loongson 6000SE SDF
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v1 1/3] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v1 0/3] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v3 0/8] crypto: skcipher_walk cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bcm - Drop unused setting of local 'ptr' variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - support new function communication
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: proc - Use str_yes_no() and str_no_yes() helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH] rhashtable: Fix rhashtable_try_insert test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] dt-bindings: crypto: qcom,inline-crypto-engine: Document the SM8750 ICE
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 4/6] arm64: dts: qcom: sm8750: Add TRNG nodes
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 1/6] dt-bindings: crypto: qcom-qce: Document the SM8750 crypto engine
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 3/6] dt-bindings: crypto: qcom,prng: Document SM8750 RNG
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 2/6] arm64: dts: qcom: sm8750: Add QCrypto nodes
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 6/6] arm64: dts: qcom: sm8750: Add ICE nodes
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- [PATCH 0/6] arm64: dts: qcom: sm8750: Introduce crypto support for SM8750
- From: Melody Olvera <quic_molvera@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] padata: avoid UAF for reorder_work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 2/3] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 1/3] padata: add pd get/put refcnt helper
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v9 3/3] s390/crypto: Enable phmac selftest invocation
- From: Holger Dengler <dengler@xxxxxxxxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [PATCH] crypto: asymmetric_keys - Remove unused key_being_used_for[]
- Re: [PATCH v2] treewide: const qualify ctl_tables where applicable
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- Re: [PATCH v2] treewide: const qualify ctl_tables where applicable
- From: Anna Schumaker <anna.schumaker@xxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: "Dixit, Ashutosh" <ashutosh.dixit@xxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] treewide: const qualify ctl_tables where applicable
- From: Joel Granados <joel.granados@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2 1/3] padata: add pd get/put refcnt helper
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] padata: avoid UAF for reorder_work
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] padata: fix UAF issues
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH v2 2/3] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 7/8] rxrpc: rxgk: Implement the yfs-rxgk security class (GSSAPI)
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 8/8] rxrpc: rxgk: Implement connection rekeying
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 6/8] rxrpc: rxgk: Provide infrastructure and key derivation
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 5/8] rxrpc: Add YFS RxGK (GSSAPI) security class
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 4/8] rxrpc: Add the security index for yfs-rxgk
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 3/8] crypto/krb5: Test manager data
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 1/8] crypto/krb5: Add some constants out of sunrpc headers
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 2/8] crypto/krb5: Provide Kerberos 5 crypto through AEAD API
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 0/8] crypto: Add generic Kerberos library with crypto as AEAD algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: Corey Minyard <corey@xxxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: const qualify ctl_tables where applicable
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH] treewide: const qualify ctl_tables where applicable
- From: Joel Granados <joel.granados@xxxxxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH v2 21/29] crypto: s390/aes-gcm - use the new scatterwalk functions
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 08/14] padata: switch padata_find_next() to using cpumask_next_wrap()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] padata: fix sysfs store callback check
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: (subset) [PATCH v3 0/4] Enable TRNG support
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 06/14] cpumask: re-introduce cpumask_next{,_and}_wrap()
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Oliver Sang <oliver.sang@xxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v5 00/12] zswap IAA compress batching
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v5 12/12] mm: zswap: Compress batching with Intel IAA in zswap_store() of large folios.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [no subject]
- RE: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: linux-next: Fixes tag needs some work in the crypto tree
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v3 8/8] crypto: skcipher - call cond_resched() directly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 7/8] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/8] crypto: skcipher - remove redundant clamping to page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 6/8] crypto: skcipher - clean up initialization of skcipher_walk::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 5/8] crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/8] crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 2/8] crypto: skcipher - remove unnecessary page alignment of bounce buffer
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/8] crypto: skcipher - document skcipher_walk_done() and rename some vars
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/8] crypto: skcipher_walk cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: omap - switch from scatter_walk to plain offset
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v10 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v10 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v10 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v10 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: bcm - Drop unused setting of local 'ptr' variable
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ahash - make hash walk functions private to ahash.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: fix sysfs store callback check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keywrap - remove unused keywrap algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmac - remove unused VMAC algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fips - Use str_enabled_disabled() helper in fips_enable()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/14] padata: switch padata_find_next() to using cpumask_next_wrap()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v3 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Fwd: Hash algorithm ask for include in linux kernel..
- From: Jorge Alberto Medina Rosas <medinarosas.jorgealberto@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 06/14] cpumask: re-introduce cpumask_next{,_and}_wrap()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 05/14] cpumask: deprecate cpumask_next_wrap()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [herbert-cryptodev-2.6:master 20/50] drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 00/14] cpumask: cleanup cpumask_next_wrap() implementation and usage
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Breno Leitao <leitao@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - support new function communication
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v9 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Holger Dengler <dengler@xxxxxxxxxxxxx>
- Re: [PATCH 00/14] cpumask: cleanup cpumask_next_wrap() implementation and usage
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: sig - Prepare for algorithms with variable signature size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ecdsa - Fix enc/dec size reported by KEYCTL_PKEY_QUERY
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v9 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v9 3/3] s390/crypto: Enable phmac selftest invocation
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v9 0/3] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v9 1/3] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmac - remove unused VMAC algorithm
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: WARNING:at_mm/util.c:#__kvmalloc_node_noprof
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- RE: [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [syzbot] [crypto?] BUG: sleeping function called from invalid context in crypto_put_default_null_skcipher
- From: syzbot <syzbot+b3e02953598f447d4d2a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: proc - Use str_yes_no() and str_no_yes() helpers
- From: Thorsten Blum <thorsten.blum@xxxxxxxxx>
- Re: [PATCH] crypto: keywrap - remove unused keywrap algorithm
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmac - remove unused VMAC algorithm
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in poly1305_core_blocks
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- KASAN: use-after-free Read in poly1305_core_blocks
- From: Liebes Wang <wanghaichi0403@xxxxxxxxx>
- Re: [PATCH v2 00/29] crypto: scatterlist handling improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 29/29] crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 28/29] crypto: scatterwalk - remove obsolete functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 24/29] crypto: x86/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 23/29] crypto: stm32 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 20/29] crypto: nx - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 22/29] crypto: s5p-sss - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 27/29] crypto: skcipher - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 26/29] net/tls: use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 25/29] crypto: x86/aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 14/29] crypto: scatterwalk - add new functions for copying data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 17/29] crypto: aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 21/29] crypto: s390/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 15/29] crypto: scatterwalk - add scatterwalk_get_sglist()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 16/29] crypto: skcipher - use scatterwalk_start_at_pos()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 19/29] crypto: arm64 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 18/29] crypto: arm/ghash - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 12/29] crypto: scatterwalk - add new functions for skipping data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 11/29] crypto: scatterwalk - move to next sg entry just in time
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 09/29] crypto: omap - switch from scatter_walk to plain offset
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 08/29] crypto: skcipher - call cond_resched() directly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 06/29] crypto: skcipher - clean up initialization of skcipher_walk::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 05/29] crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 03/29] crypto: skcipher - remove redundant clamping to page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 04/29] crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 02/29] crypto: skcipher - remove unnecessary page alignment of bounce buffer
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 01/29] crypto: skcipher - document skcipher_walk_done() and rename some vars
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 00/29] crypto: scatterlist handling improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: ahash - make hash walk functions private to ahash.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: keywrap - remove unused keywrap algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 08/14] padata: switch padata_find_next() to using cpumask_next_wrap()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 06/14] cpumask: re-introduce cpumask_next{,_and}_wrap()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 05/14] cpumask: deprecate cpumask_next_wrap()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 00/14] cpumask: cleanup cpumask_next_wrap() implementation and usage
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v1] crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ahash - make hash walk functions private to ahash.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] padata: fix sysfs store callback check
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH] crypto: keywrap - remove unused keywrap algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [REGRESSION][BISECTED] Double energy consumption on idle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] crypto: vmac - remove unused VMAC algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [herbert-cryptodev-2.6:master] [rhashtable] e1d3422c95: stress-ng.syscall.ops_per_sec 98.9% regression
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH] crypto: vmac - Handle unaligned input in vmac_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-next:master] [x86/crc32] 55d1ecceb8: INFO:task_blocked_for_more_than#seconds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmac - Handle unaligned input in vmac_update
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmac - remove unused VMAC algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmac - Handle unaligned input in vmac_update
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key size reported by KEYCTL_PKEY_QUERY
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 2/3] crypto: ecdsa - Fix enc/dec size reported by KEYCTL_PKEY_QUERY
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: (subset) [PATCH V5 0/2] Enable TRNG for QCS8300
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: (subset) [PATCH V3 0/2] Enable Inline crypto engine for QCS8300
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- [PATCH 1/3] crypto: sig - Prepare for algorithms with variable signature size
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0/3] ecdsa KEYCTL_PKEY_QUERY fixes
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: vmac - Handle unaligned input in vmac_update
- From: Atharva Tiwari <evepolonium@xxxxxxxxx>
- [PATCH] crypto: vmac - Fix misalignment issue during vmac_update
- From: Atharva Tiwari <evepolonium@xxxxxxxxx>
- Re: [PATCH] crypto: vmac: fix misaligned pointer handling in vmac_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: vmac: fix misaligned pointer handling in vmac_update
- From: Atharva Tiwari <evepolonium@xxxxxxxxx>
- Re: [PATCH v5 02/12] dmaengine: add DMA_PREP_LOCK and DMA_PREP_UNLOCK flag
- From: Mukesh Kumar Savaliya <quic_msavaliy@xxxxxxxxxxx>
- [PATCH v3 4/4] arm64: dts: qcom: ipq5332: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v3 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v3 2/4] arm64: dts: qcom: ipq5424: add TRNG node
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v3 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v3 0/4] Enable TRNG support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [linux-next:master] [x86/crc32] 55d1ecceb8: INFO:task_blocked_for_more_than#seconds
- From: Oliver Sang <oliver.sang@xxxxxxxxx>
- Re: [linux-next:master] [x86/crc32] 55d1ecceb8: INFO:task_blocked_for_more_than#seconds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] Double energy consumption on idle
- From: Kurt Borja <kuurtb@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] Double energy consumption on idle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [linux-next:master] [x86/crc32] 55d1ecceb8: INFO:task_blocked_for_more_than#seconds
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [REGRESSION][BISECTED] Double energy consumption on idle
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [REGRESSION][BISECTED] Double energy consumption on idle
- From: Kurt Borja <kuurtb@xxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] nvmet: add tls_concat and tls_key debugfs entries
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/10] nvme-tcp: request secure channel concatenation
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 06/10] nvme: always include <linux/key.h>
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH v5 02/12] dmaengine: add DMA_PREP_LOCK and DMA_PREP_UNLOCK flag
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [RFC PATCH v3 13/13] clavis: Kunit support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- From: "Dr. David Alan Gilbert" <linux@xxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH] crypto: fips - Use str_enabled_disabled() helper in fips_enable()
- From: Thorsten Blum <thorsten.blum@xxxxxxxxx>
- Re: [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- From: "Dr. David Alan Gilbert" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx: fix OF node reference leaks in init_ixp_crypto()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] crypto: hisilicon - fix the authsize and icv problems of aead in sec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] crypto: x86 - minor optimizations and cleanup to VAES code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/12] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto.
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v1] crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH] crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 11/22] crypto: amlogic - Introduce hasher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 29/29] crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 28/29] crypto: scatterwalk - remove obsolete functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 27/29] crypto: skcipher - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 25/29] crypto: x86/aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 24/29] crypto: x86/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 23/29] crypto: stm32 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 22/29] crypto: s5p-sss - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 21/29] crypto: s390/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/29] crypto: nx - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 19/29] crypto: keywrap - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 18/29] crypto: arm64 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 17/29] crypto: arm/ghash - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/29] crypto: aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/29] crypto: scatterwalk - add new functions for copying data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/29] crypto: skcipher - use scatterwalk_start_at_pos()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/29] crypto: scatterwalk - move to next sg entry just in time
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/29] crypto: skcipher - call cond_resched() directly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/29] crypto: scatterwalk - add new functions for skipping data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/29] crypto: omap - switch from scatter_walk to plain offset
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/29] crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/29] crypto: skcipher - clean up initialization of skcipher_walk::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/29] crypto: skcipher - remove unnecessary page alignment of bounce buffer
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/29] crypto: skcipher - remove redundant clamping to page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/29] crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/29] crypto: skcipher - document skcipher_walk_done() and rename some vars
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/29] crypto: scatterlist handling improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 09/12] crypto: iaa - Distribute compress jobs from all cores to all IAAs on a package.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 12/12] mm: zswap: Compress batching with Intel IAA in zswap_store() of large folios.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 08/12] crypto: iaa - Map IAA devices/wqs to cores based on packages instead of NUMA.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 07/12] crypto: iaa - Re-organize the iaa_crypto driver code.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 06/12] crypto: iaa - Disable iaa_verify_compress by default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 05/12] crypto: iaa - Make async mode the default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 04/12] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 03/12] crypto: iaa - Add an acomp_req flag CRYPTO_ACOMP_REQ_POLL to enable async mode.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 01/12] crypto: acomp - Add synchronous/asynchronous acomp request chaining.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 00/12] zswap IAA compress batching
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/4] arm64: dts: qcom: ipq5332: update TRNG compatible
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v2 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 4/4] arm64: dts: qcom: ipq5332: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 2/4] arm64: dts: qcom: ipq5424: add TRNG node
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 0/4] Enable TRNG support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 11/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 02/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 04/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v1] drivers/crypto/ccp: change signature of sp_init()
- From: Denis Plotnikov <den-plotnikov@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v8 3/3] s390/crypto: Enable phmac selftest invocation
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 1/3] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 0/3] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 6/7] crypto: tegra: Fix CMAC intermediate result handling
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 4/7] crypto: tegra: Transfer HASH init function to crypto engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 7/7] crypto: tegra: Set IV to NULL explicitly for AES ECB
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 5/7] crypto: tegra: Fix HASH intermediate result handling
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 0/7] Tegra Security Engine driver improvements
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 2/7] crypto: tegra: Do not use fixed size buffers
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 3/7] crypto: tegra: check retrun value for hash do_one_req
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Bartosz Golaszewski <bartosz.golaszewski@xxxxxxxxxx>
- Re: next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- [PATCH] crypto: ixp4xx: fix OF node reference leaks in init_ixp_crypto()
- From: Joe Hattori <joe@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 0/8] crypto: more alignmask cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v11 03/22] crypto: amlogic - Remove clock input
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 06/22] crypto: amlogic - Drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 02/22] crypto: amlogic - Add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 04/22] crypto: amlogic - Add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 00/22] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 01/22] crypto: amlogic - Don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 05/22] crypto: amlogic - Move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 22/22] arm64: dts: amlogic: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 21/22] arm64: dts: amlogic: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 20/22] arm64: dts: amlogic: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 19/22] arm64: dts: amlogic: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 17/22] dt-bindings: crypto: amlogic,gxl-crypto: support new SoC's
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 18/22] arm64: dts: amlogic: gxl: correct crypto node definition
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 16/22] dt-bindings: crypto: amlogic,gxl-crypto: correct clk and interrupt lines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 15/22] crypto: amlogic - Add support for A1-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 14/22] crypto: amlogic - Add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 13/22] crypto: amlogic - Add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 12/22] crypto: amlogic - Use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 11/22] crypto: amlogic - Introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 07/22] crypto: amlogic - Move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 09/22] crypto: amlogic - Process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 10/22] crypto: amlogic - Avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 08/22] crypto: amlogic - Cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] crypto: hisilicon - fix the authsize and icv problems of aead in sec
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v5 1/2] crypto: hisilicon/sec2 - fix for aead icv error
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v5 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] Wire up CRC32 library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/12] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: x86/aes-xts - more code size optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: x86/aes-xts - make the register aliases per-function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/8] crypto: x86 - minor optimizations and cleanup to VAES code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: x86/aes-xts - improve some comments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 8/8] crypto: x86/aes-xts - additional optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: x86/aes-xts - change len parameter to int
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: x86/aes-gcm - tune better for AMD CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: x86/aes-gcm - code size optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: x86/aes-xts - use .irp when useful
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/12] crypto: qce - Convert register r/w for skcipher via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 00/12] dmaengine: qcom: bam_dma: add cmd descriptor support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 12/12] crypto: qce - Add support for lock/unlock in aead
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 11/12] crypto: qce - Add support for lock/unlock in sha
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 10/12] crypto: qce - Add support for lock/unlock in skcipher
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 09/12] crypto: qce - Add LOCK and UNLOCK flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 08/12] crypto: qce - Convert register r/w for aead via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 07/12] crypto: qce - Convert register r/w for sha via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 05/12] crypto: qce - Add bam dma support for crypto register r/w
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 04/12] crypto: qce - Add support for crypto address read
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 03/12] dmaengine: qcom: bam_dma: add bam_pipe_lock flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 02/12] dmaengine: add DMA_PREP_LOCK and DMA_PREP_UNLOCK flag
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 01/12] dmaengine: qcom: bam_dma: Add bam_sw_version register read
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- Re: [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 7/7] crypto: x86/aes-xts - more code size optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/7] crypto: x86/aes-xts - improve some comments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/7] crypto: x86/aes-xts - change len parameter to int
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/7] crypto: x86/aes-xts - make the register aliases per-function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/7] crypto: x86/aes-xts - use .irp when useful
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/7] crypto: x86/aes-gcm - tune better for AMD CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/7] crypto: x86/aes-gcm - code size optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/7] crypto: x86 - minor optimizations and cleanup to VAES code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH] FIPS kernels should default to fips mode
- From: Atharva Tiwari <evepolonium@xxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - use JobR's space to access page 0 regs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 1/2] dt-bindings: crypto: qcom,prng: document QCS8300
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon - add data aggregation feature
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tegra - do not transfer req when tegra init fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cctrng: Add cancel_work_sync before module remove
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add KUnit tests for curve25519
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [no subject]
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH v7 1/2] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v7 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v7 0/2] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: more alignmask cleanups
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/11] dmaengine: qcom: bam_dma: add LOCK & UNLOCK flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH] Add KUnit tests for curve25519
- From: Enzo Bertoloti <ebertoloti@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- [no subject]
- [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH 7/8] crypto: aegis - remove assignments of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/8] crypto: keywrap - remove assignment of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/8] crypto: x86 - remove assignments of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/8] crypto: khazad - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/8] crypto: seed - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/8] crypto: tea - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/8] crypto: aria - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/8] crypto: more alignmask cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/8] crypto: anubis - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: drivers - remove Niagara2 SPU driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: skcipher - remove support for physical address walks
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: chenridong <chenridong@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: chenridong <chenridong@xxxxxxxxxx>
- Re: [PATCH] padata: Fix refcnt handling in padata_free_shell() again
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH V2 2/2] arm64: dts: qcom: qcs8300: add QCrypto nodes
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- [no subject]
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH] cpumask: work around false-postive stringop-overread errors
- From: Brian Norris <briannorris@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tegra - do not transfer req when tegra init fails
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [PATCH v4 02/11] dmaengine: qcom: bam_dma: add LOCK & UNLOCK flag support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: Stephan Gerhold <stephan.gerhold@xxxxxxxxxx>
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] padata: Fix refcnt handling in padata_free_shell() again
- From: Zach Wade <zachwade.k@xxxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 8/9] crypto: qce - convert tasklet to workqueue
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 1/9] crypto: qce - fix goto jump in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] crypto: qce - make qce_register_algs() a managed interface
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 7/9] crypto: qce - use __free() for a buffer that's always freed
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 5/9] crypto: qce - convert qce_dma_request() to use devres
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 3/9] crypto: qce - remove unneeded call to icc_set_bw() in error path
- From: neil.armstrong@xxxxxxxxxx
- [PATCH 06/10] nvme: always include <linux/key.h>
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 07/10] nvme-tcp: request secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 08/10] nvme-fabrics: reset admin connection for secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 02/10] nvme: add nvme_auth_generate_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- Re: [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 10/10] nvmet: add tls_concat and tls_key debugfs entries
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 05/10] nvme-keyring: add nvme_tls_psk_refresh()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 1/6] nvme-keyring: add nvme_tls_psk_refresh()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCHv13 00/10] nvme: implement secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]