Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2] crypto: Use struct_size() helper in kmalloc()
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: Use struct_size() helper in kmalloc()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH v2] crypto: Use struct_size() helper in kmalloc()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] crypto: Use struct_size() helper in kmalloc()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix scatterwalk_unmap() callers in AES-GCM
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: John Allen <john.allen@xxxxxxx>
- Re: Bug in atmel-ecc driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH] s390/crypto: fix scatterwalk_unmap() callers in AES-GCM
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH 0/4] crypto: qat - enable configuration for 4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 4/4] crypto: qat - expose device config through sysfs for 4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 3/4] crypto: qat - relocate and rename adf_sriov_prepare_restart()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 2/4] crypto: qat - change behaviour of adf_cfg_add_key_value_param()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/4] crypto: qat - expose device state through sysfs for 4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: Bug in atmel-ecc driver
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] random: remove mostly unused async readiness notifier
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: Bug in atmel-ecc driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v10 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] random: remove mostly unused async readiness notifier
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: remove mostly unused async readiness notifier
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [RFC PATCH 2/2] Removes the x86 dependency on the QAT drivers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: Use struct_size() helper in kmalloc()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] random: remove get_random_bytes_arch() and add rng_has_arch_random()
- From: Petr Mladek <pmladek@xxxxxxxx>
- RE: [EXT] Re: [BUG] Layerscape CAAM+kTLS+io_uring
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH -next] crypto: Fix build error when CRYPTO_BLAKE2S_X86=m && CRYPTO_ALGAPI2=m && CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y
- From: gaochao <gaochao49@xxxxxxxxxx>
- [PATCH] crypto: asymmetric_keys: remove redundant pointer secs
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [RFC PATCH 0/2] Crypto: Remove x86 dependency on QAT drivers
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH 2/2] Removes the x86 dependency on the QAT drivers
- From: yoan.picchi@xxxxxxx
- [RFC PATCH 1/2] crypto: qat: replace get_current_node() with numa_node_id()
- From: yoan.picchi@xxxxxxx
- [RFC PATCH 0/2] Crypto: Remove x86 dependency on QAT drivers
- From: yoan.picchi@xxxxxxx
- Re: [BUG] Layerscape CAAM+kTLS+io_uring
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH] random: remove mostly unused async readiness notifier
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: remove get_random_bytes_arch() and add rng_has_arch_random()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: do not pretend to handle premature next security model
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: do not pretend to handle premature next security model
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] random: remove get_random_bytes_arch() and add rng_has_arch_random()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH -next] hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v6 2/9] qapi: crypto-akcipher: Introduce akcipher types to qapi
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 3/9] crypto: Introduce akcipher crypto class
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 6/9] crypto: Implement RSA algorithm by gcrypt
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 8/9] tests/crypto: Add test suite for RSA keys
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 1/9] virtio-crypto: header update
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 7/9] test/crypto: Add test suite for crypto akcipher
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 4/9] crypto: add ASN.1 DER decoder
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 9/9] crypto: Introduce RSA algorithm
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 5/9] crypto: Implement RSA algorithm by hogweed
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 0/9] Introduce akcipher service for virtio-crypto
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 4/7] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 5/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 6/7] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Bug in atmel-ecc driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [External] [PATCH v5 5/9] crypto: Implement RSA algorithm by hogweed
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [External] [PATCH v5 5/9] crypto: Implement RSA algorithm by hogweed
- From: 何磊 <helei.sig11@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/9] crypto: Implement RSA algorithm by gcrypt
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 5/9] crypto: Implement RSA algorithm by hogweed
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 8/9] tests/crypto: Add test suite for RSA keys
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Introduce akcipher service for virtio-crypto
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5 0/9] Introduce akcipher service for virtio-crypto
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3] random: use first 128 bits of input as fast init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: credit architectural init the exact amount
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: mix in timestamps and reseed on system restore
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random32: use real rng for non-deterministic randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: cryptd - Protect per-CPU resource by disabling BH.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - Protect per-CPU resource by disabling BH.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: simplify the return expression of otx2_cpt_aead_cbc_aes_sha_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: add crypto library interface for ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - Uniform coding style with defined variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/19] crypto: allwinner: lots of fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - delete the flag CRYPTO_ALG_ALLOCATES_MEMORY
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/sec - delele the flag CRYPTO_ALG_ALLOCATES_MEMORY
- From: "yekai(A)" <yekai13@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - delele the flag CRYPTO_ALG_ALLOCATES_MEMORY
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v4] random: use static branch for crng_ready()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: do not use batches when !crng_ready()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random32: use real rng for non-deterministic randomness
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: credit architectural init the exact amount
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] random: use first 128 bits of input as fast init
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: mix in timestamps and reseed on system restore
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: Re: [PATCH v5 1/9] virtio-crypto: header update
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH] random32: use real rng for non-deterministic randomness
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 13/22] dma: qcom: bam_dma: Add support to initialize interconnect path
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- Re: [PATCH] random32: use real rng for non-deterministic randomness
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: John Allen <john.allen@xxxxxxx>
- [PATCH] crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v4] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] random: credit architectural init the exact amount
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v1] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 3/9] crypto: Introduce akcipher crypto class
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 1/9] virtio-crypto: header update
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 4/9] crypto: add ASN.1 DER decoder
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 7/9] test/crypto: Add test suite for crypto akcipher
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH RFC v1] random: use static branch for crng_ready()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/7] crypto: api - Add crypto_tfm_ctx_dma
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Pavel Machek <pavel@xxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Thomas Ristenpart <ristenpart@xxxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] random32: use real rng for non-deterministic randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH RFC v1] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] random: do not pretend to handle premature next security model
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- RE: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] random: do not pretend to handle premature next security model
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- PING: [PATCH v6 0/5] virtio-crypto: Improve performance
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v8 0/9] crypto: HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "D. J. Bernstein" <djb@xxxxxxxxxxxx>
- [PATCH v8 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 5/9] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 9/9] fscrypt: Add HCTR2 support for filename encryption
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 7/9] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 4/9] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 8/9] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 3/9] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 1/9] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 2/9] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v8 0/9] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [RFC PATCH 2/7] crypto: api - Add crypto_tfm_ctx_dma
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] crypto: qat - add support for 401xx devices
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2] random: do not use input pool from hard IRQs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [RFC PATCH 7/7] crypto: caam - Explicitly request DMA alignment
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 6/7] crypto: api - Increase MAX_ALGAPI_ALIGNMASK to 127
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 5/7] crypto: skcipher - Add ctx helpers with DMA alignment
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/7] crypto: aead - Add ctx helpers with DMA alignment
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/7] crypto: Prepare to move crypto_tfm_ctx
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 4/7] crypto: hash - Add ctx helpers with DMA alignment
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/7] crypto: api - Add crypto_tfm_ctx_dma
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/7] crypto: Add helpers for allocating with DMA alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Fix build error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 7/9] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 8/9] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [EXT] Re: [PATCHv3 06/10]crypto: add rocksoft 64b crc framework
- From: Xiaoming Zhou <xzhou@xxxxxxxxxxx>
- Re: [PATCHv3 06/10]crypto: add rocksoft 64b crc framework
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 1/9] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 4/9] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 9/9] fscrypt: Add HCTR2 support for filename encryption
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 3/9] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 7/9] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 2/9] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 8/9] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 5/9] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v7 0/9] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH] random: remove ratelimiting for in-kernel unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Yevgeniy Dodis <dodis@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 10/10] crypto: qat - re-enable registration of algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 10/10] crypto: qat - re-enable registration of algorithms
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - set to zero DH parameters before free
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH v3 10/10] crypto: qat - re-enable registration of algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 08/10] crypto: qat - add param check for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 09/10] crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 07/10] crypto: qat - add param check for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 06/10] crypto: qat - remove dma_free_coherent() for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 02/10] crypto: qat - refactor submission logic
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 03/10] crypto: qat - add backlog mechanism
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 04/10] crypto: qat - fix memory leak in RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 05/10] crypto: qat - remove dma_free_coherent() for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 01/10] crypto: qat - use pre-allocated buffers in datapath
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 00/10] crypto: qat - re-enable algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: add crypto library interface for ChaCha20
- From: Vlad Dronov <vdronov@xxxxxxxxxx>
- Re: [PATCH] s390/crypto: add crypto library interface for ChaCha20
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: Build regressions/improvements in v5.18-rc6B
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v7 25/33] dt-bindings: crypto: rockchip: convert to new driver bindings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- PING: [PATCH v5 9/9] crypto: Introduce RSA algorithm
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v7 19/33] crypto: rockchip: add support for rk3328
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 05/33] crypto: rockchip: do not store mode globally
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 02/33] crypto: rockchip: do not use uninitialized variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 22/33] crypto: rockchip: use a rk_crypto_info variable instead of lot of indirection
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 15/33] crypto: rockchip: use clk_bulk to simplify clock management
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 23/33] crypto: rockchip: use the rk_crypto_info given as parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 24/33] dt-bindings: crypto: convert rockchip-crypto to YAML
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 28/33] arm64: dts: rockchip: rk3399: add crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 20/33] crypto: rockchip: rename ablk functions to cipher
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 21/33] crypto: rockchip: rework rk_handle_req function
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 00/33] crypto: rockchip: permit to pass self-tests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 07/33] crypto: rockchip: add fallback for ahash
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 11/33] crypto: rockchip: rewrite type
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 26/33] clk: rk3399: use proper crypto0 name
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 12/33] crypto: rockchip: add debugfs
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 30/33] crypto: rockchip: Check for clocks numbers and their frequencies
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 32/33] crypto: rockchip: permit to have more than one reset
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 08/33] crypto: rockchip: better handle cipher key
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 01/33] crypto: rockchip: use dev_err for error message about interrupt
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 27/33] arm64: dts: rockchip: add rk3328 crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 03/33] crypto: rockchip: do not do custom power management
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 33/33] crypto: rockchip: Add support for RK3399
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 16/33] crypto: rockchip: add myself as maintainer
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 09/33] crypto: rockchip: remove non-aligned handling
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 06/33] crypto: rockchip: add fallback for cipher
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 10/33] crypto: rockchip: rework by using crypto_engine
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 04/33] crypto: rockchip: fix privete/private typo
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 18/33] crypto: rockchip: fix style issue
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 29/33] crypto: rockchip: store crypto_info in request context
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 25/33] dt-bindings: crypto: rockchip: convert to new driver bindings
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 13/33] crypto: rockchip: introduce PM
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 17/33] crypto: rockchip: use read_poll_timeout
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 14/33] crypto: rockchip: handle reset also in PM
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v7 31/33] crypto: rockchip: rk_ahash_reg_init use crypto_info from parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH] s390/crypto: add crypto library interface for ChaCha20
- From: Vladis Dronov <vdronoff@xxxxxxxxx>
- [PATCH] crypto: talitos - Uniform coding style with defined variable
- From: jianchunfu <jianchunfu@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCHv3 06/10]crypto: add rocksoft 64b crc framework
- From: Xiaoming Zhou <xzhou@xxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: John Ernberg <john.ernberg@xxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH] siphash: use one source of truth for siphash permutations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH] crypto: vmx - Fix build error
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 3/3] random: help compiler out with fast_mix() by using simpler arguments
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/3] random: do not use input pool from hard IRQs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/3] random: order timer entropy functions below interrupt functions
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [timekeeping] 3aeaac747d: PANIC:early_exception
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v2] crypto: vmx - Align the short log with Makefile cleanups
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 07/11] crypto: qat - set to zero DH parameters before free
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: qat - re-enable registration of algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 10/11] crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 08/11] crypto: qat - add param check for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 07/11] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 09/11] crypto: qat - add param check for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 06/11] crypto: qat - remove dma_free_coherent() for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 05/11] crypto: qat - remove dma_free_coherent() for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 00/11] crypto: qat - re-enable algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 04/11] crypto: qat - fix memory leak in RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 01/11] crypto: qat - use pre-allocated buffers in datapath
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 03/11] crypto: qat - add backlog mechanism
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 02/11] crypto: qat - refactor submission logic
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] virtio-crypto: adjust dst_len at ops callback
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 2/5] virtio-crypto: use private buffer for control request
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 0/5] virtio-crypto: Improve performance
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 1/5] virtio-crypto: change code style
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v6 3/5] virtio-crypto: wait ctrl queue instead of busy polling
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: RE: [PATCH v5 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: atmel - Avoid flush_scheduled_work() usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-i2c - Simplify return code in probe function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: atmel-sha204a: Remove useless check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] crypto: caam/rng: Add support for PRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8] timekeeping: Add raw clock fallback for random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/sec - add sm4 generic selection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Add support for ATSHA204 cryptochip
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [timekeeping] 3aeaac747d: PANIC:early_exception
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: RE: [PATCH v5 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: qat - refactor submission logic
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: qat - refactor submission logic
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- RE: [PATCH v5 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH v5 4/5] virtio-crypto: adjust dst_len at ops callback
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH v5 3/5] virtio-crypto: wait ctrl queue instead of busy polling
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH 02/12] crypto: qat - refactor submission logic
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v5 2/5] virtio-crypto: use private buffer for control request
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH v5 1/5] virtio-crypto: change code style
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- [PATCH 12/12] crypto: qat - re-enable registration of algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 10/12] crypto: qat - use memzero_explicit() for algs
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 09/12] crypto: qat - add param check for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 11/12] crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 07/12] crypto: qat - set to zero DH parameters before free
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 08/12] crypto: qat - add param check for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 05/12] crypto: qat - remove dma_free_coherent() for RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 06/12] crypto: qat - remove dma_free_coherent() for DH
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 03/12] crypto: qat - add backlog mechanism
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 02/12] crypto: qat - refactor submission logic
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 04/12] crypto: qat - fix memory leak in RSA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 01/12] crypto: qat - use pre-allocated buffers in datapath
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 00/12] crypto: qat - re-enable algorithms
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [timekeeping] 3aeaac747d: PANIC:early_exception
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v9 4/7] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 5/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 6/7] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 5/9] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [timekeeping] 3aeaac747d: PANIC:early_exception
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [BUG] Layerscape CAAM+kTLS+io_uring
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [BUG] Layerscape CAAM+kTLS+io_uring
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: John Ernberg <john.ernberg@xxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: Re: PING: [PATCH v4 0/5] virtio-crypto: Improve performance
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 2/5] virtio-crypto: use private buffer for control request
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 4/5] virtio-crypto: adjust dst_len at ops callback
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 0/5] virtio-crypto: Improve performance
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 3/5] virtio-crypto: wait ctrl queue instead of busy polling
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 1/5] virtio-crypto: change code style
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 8/9] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 7/9] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: PING: [PATCH v4 0/5] virtio-crypto: Improve performance
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v6 4/9] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: PING: [PATCH v4 0/5] virtio-crypto: Improve performance
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- PING: [PATCH v4 0/5] virtio-crypto: Improve performance
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH] crypto: octeontx2: simplify the return expression of otx2_cpt_aead_cbc_aes_sha_setkey()
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] random: use first 128 bits of input as fast init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v7] timekeeping: Add raw clock fallback for random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] random: use first 128 bits of input as fast init
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [patch 3/3] x86/fpu: Make FPU protection more robust
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] crypto: cryptd - Protect per-CPU resource by disabling BH.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH] random: do not pretend to handle premature next security model
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3] random: use first 128 bits of input as fast init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: mix hwgenerator randomness before sleeping
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH] crypto: atmel-i2c - Simplify return code in probe function
- From: <Claudiu.Beznea@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] random: mix hwgenerator randomness before sleeping
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] random: mix hwgenerator randomness before sleeping
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v6 9/9] fscrypt: Add HCTR2 support for filename encryption
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 8/9] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 6/9] crypto: arm64/aes-xctr: Improve readability of XCTR and CTR modes
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 7/9] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 5/9] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 4/9] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 3/9] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 2/9] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 1/9] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v6 0/9] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH] random: mix hwgenerator randomness before sleeping
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] random: mix hwgenerator randomness before sleeping
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
- From: Brian Masney <bmasney@xxxxxxxxxx>
- [PATCH] crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH RFC v1] random: use static branch for crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2] random: use first 128 bits of input as fast init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- [PATCH] random: do not use batches when !crng_ready()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v5 06/11] nios2: use fallback for random_get_entropy() instead of zero
- From: Dinh Nguyen <dinguyen@xxxxxxxxxx>
- [PATCH v2 17/19] crypto: sun8i-ce: use sg_nents_for_len
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 15/19] crypto: sun8i-ss: do not fallback if cryptlen is less than sg length
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 12/19] crypto: sun8i-ss: rework debugging
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 10/19] crypto: sun8i-ss: do not zeroize all pad
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 16/19] crypto: sun8i-ce: Add function for handling hash padding
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 14/19] crypto: sun8i-ss: add hmac(sha1)
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 09/19] crypto: sun8i-ss: do not allocate memory when handling hash requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 19/19] crypto: sun8i-ce: do not fallback if cryptlen is less than sg length
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 13/19] crypto: sun8i-ss: Add function for handling hash padding
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 18/19] crypto: sun8i-ce: rework debugging
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 11/19] crypto: sun8i-ss: handle requests if last block is not modulo 64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 03/19] crypto: sun4i-ss: do not allocate backup IV on requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 05/19] crypto: sun8i-ss: handle zero sized sg
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 07/19] crypto: sun8i-ss: test error before assigning
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 08/19] crypto: sun8i-ss: use sg_nents_for_len
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 04/19] crypto: sun8i-ss: rework handling of IV
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 06/19] crypto: sun8i-ss: remove redundant test
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 02/19] crypto: sun8i-ce: do not allocate memory when handling requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 01/19] crypto: sun8i-ce: Fix minor style issue
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 00/19] crypto: allwinner: lots of fixes
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Add support for ATSHA204 cryptochip
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 7/8] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 6/8] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/2] random: add fork_event sysctl for polling VM forks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] sysctl: read() must consume poll events, not poll()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v7 13/17] x86/asm: use fallback for random_get_entropy() instead of zero
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/17] timekeeping: add raw clock fallback for random_get_entropy()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: fix typos in comments
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 4/8] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 6/8] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 7/8] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 8/8] fscrypt: Add HCTR2 support for filename encryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - Align the short log with Makefile cleanups
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH] random: mix in timestamps and reseed on system restore
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: tytso <tytso@xxxxxxx>
- Re: [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH v9 06/21] openrisc: start CPU timer early in boot
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v8 06/19] openrisc: start CPU timer early in boot
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v8 06/19] openrisc: start CPU timer early in boot
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH] s390/crypto: fix typos in comments
- From: Julia Lawall <Julia.Lawall@xxxxxxxx>
- [PATCH] random: use first 128 bits of input as fast init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v8 06/19] openrisc: start CPU timer early in boot
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2] crypto: atmel - Avoid flush_scheduled_work() usage
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH] crypto: atmel-i2c - Simplify return code in probe function
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v5 1/1] crypto: caam/rng: Add support for PRNG
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v5 0/1] crypto: caam/rng: Add support for PRNG
- From: meenakshi.aggarwal@xxxxxxx
- Re: [PATCH v4 1/1] crypto: caam/rng: Add support for PRNG
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v4 0/1] crypto: caam/rng: Add support for PRNG
- From: meenakshi.aggarwal@xxxxxxx
- [PATCH v4 1/1] crypto: caam/rng: Add support for PRNG
- From: meenakshi.aggarwal@xxxxxxx
- Re: [PATCH] crypto: atmel - Avoid flush_scheduled_work() usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel - Avoid flush_scheduled_work() usage
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: optee-rng: remove redundant initialization to variable rng_size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix unsigned function returning negative constant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecrdsa - Fix incorrect use of vli_cmp
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make use of the helper function devm_platform_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Fix the INIT_EX data file open failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: using pm_runtime_resume_and_get instead of pm_runtime_get_sync
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: caam - fix i.MX6SX entropy delay value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: using pm_runtime_resume_and_get instead of pm_runtime_get_sync
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] hwrng: cn10k - Enable compile testing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel - Avoid flush_scheduled_work() usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 11/17] openrisc: account for 0 starting value in random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha204a: Remove useless check
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: atmel-sha204a: Suppress duplicate error message
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v5 9/9] crypto: Introduce RSA algorithm
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 8/9] tests/crypto: Add test suite for RSA keys
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 0/9] Introduce akcipher service for virtio-crypto
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 1/9] virtio-crypto: header update
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 5/9] crypto: Implement RSA algorithm by hogweed
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 7/9] test/crypto: Add test suite for crypto akcipher
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 6/9] crypto: Implement RSA algorithm by gcrypt
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 3/9] crypto: Introduce akcipher crypto class
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 4/9] crypto: add ASN.1 DER decoder
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v5 2/9] qapi: crypto-akcipher: Introduce akcipher types to qapi
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v8 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 2/6] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: is "premature next" a real world rng concern, or just an academic exercise?
- From: Nadia Heninger <nadiah@xxxxxxxxxxx>
- Re: [PATCH v6 05/17] powerpc: define get_cycles macro for arch-override
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 11/17] openrisc: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 11/17] openrisc: use fallback for random_get_entropy() instead of zero
- From: Stafford Horne <shorne@xxxxxxxxx>
- is "premature next" a real world rng concern, or just an academic exercise?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 1/1] crypto: caam/rng: Add support for PRNG
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [BUG] Layerscape CAAM+kTLS+io_uring
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Antoine Tenart <atenart@xxxxxxxxxx>
- [PATCH v2] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Juerg Haefliger <juerg.haefliger@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Juerg Haefliger <juergh@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Antoine Tenart <atenart@xxxxxxxxxx>
- [PATCH] crypto: inside-secure - Add MODULE_FIRMWARE macros
- From: Juerg Haefliger <juerg.haefliger@xxxxxxxxxxxxx>
- RE: [EXT] [PATCH v5] crypto: caam - fix i.MX6SX entropy delay value
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH] hwrng: cn10k - Enable compile testing
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 09/17] mips: use fallback for random_get_entropy() instead of just c0 random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 6/8] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 8/8] fscrypt: Add HCTR2 support for filename encryption
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 7/8] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 5/8] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 3/8] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 4/8] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 2/8] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 1/8] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH v5 0/8] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH v6 04/17] alpha: define get_cycles macro for arch-override
- From: Matt Turner <mattst88@xxxxxxxxx>
- Re: [PATCH v6 09/17] mips: use fallback for random_get_entropy() instead of just c0 random
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [PATCH] ecdsa: Fix incorrect usage of vli_cmp
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: fvp: Add virtio-rng support
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH] crypto: hisilicon/sec - add sm4 generic selection
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v4 7/8] tests/crypto: Add test suite for crypto akcipher
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v4 6/8] crypto: Implement RSA algorithm by gcrypt
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v4 5/8] crypto: Implement RSA algorithm by hogweed
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v4 4/8] crypto: add ASN.1 decoder
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v4 3/8] crypto: Introduce akcipher crypto class
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v4 2/8] crypto-akcipher: Introduce akcipher types to qapi
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: mmotm 2022-04-25-17-59 uploaded (drivers/char/hw_random/mpfs-rng.c)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 13/17] x86/asm: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 25/33] dt-bindings: crypto: rockchip: convert to new driver bindings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v6 24/33] dt-bindings: crypto: convert rockchip-crypto to YAML
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: mmotm 2022-04-25-17-59 uploaded (drivers/char/hw_random/mpfs-rng.c)
- From: <Conor.Dooley@xxxxxxxxxxxxx>
- Re: Re: [PATCH v4 1/5] virtio-crypto: change code style
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] virtio-crypto: change code style
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION e7d6987e09a328d4a949701db40ef63fbb970670
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: mmotm 2022-04-25-17-59 uploaded (drivers/char/hw_random/mpfs-rng.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v6 33/33] crypto: rockchip: Add support for RK3399
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 25/33] dt-bindings: crypto: rockchip: convert to new driver bindings
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 26/33] clk: rk3399: use proper crypto0 name
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 32/33] crypto: rockchip: permit to have more than one reset
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 27/33] arm64: dts: rockchip: add rk3328 crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 28/33] arm64: dts: rockchip: rk3399: add crypto node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 31/33] crypto: rockchip: rk_ahash_reg_init use crypto_info from parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 30/33] crypto: rockchip: Check for clocks numbers and their frequencies
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 29/33] crypto: rockchip: store crypto_info in request context
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 24/33] dt-bindings: crypto: convert rockchip-crypto to YAML
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 23/33] crypto: rockchip: use the rk_crypto_info given as parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 13/33] crypto: rockchip: introduce PM
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 22/33] crypto: rockchip: use a rk_crypto_info variable instead of lot of indirection
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 17/33] crypto: rockchip: use read_poll_timeout
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 16/33] crypto: rockchip: add myself as maintainer
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 18/33] crypto: rockchip: fix style issue
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 21/33] crypto: rockchip: rework rk_handle_req function
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 20/33] crypto: rockchip: rename ablk functions to cipher
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 19/33] crypto: rockchip: add support for rk3328
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 14/33] crypto: rockchip: handle reset also in PM
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 15/33] crypto: rockchip: use clk_bulk to simplify clock management
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 12/33] crypto: rockchip: add debugfs
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 08/33] crypto: rockchip: better handle cipher key
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 11/33] crypto: rockchip: rewrite type
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 07/33] crypto: rockchip: add fallback for ahash
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 06/33] crypto: rockchip: add fallback for cipher
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 05/33] crypto: rockchip: do not store mode globally
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 04/33] crypto: rockchip: fix privete/private typo
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 10/33] crypto: rockchip: rework by using crypto_engine
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 09/33] crypto: rockchip: remove non-aligned handling
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 03/33] crypto: rockchip: do not do custom power management
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 02/33] crypto: rockchip: do not use uninitialized variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 00/33] crypto: rockchip: permit to pass self-tests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v6 01/33] crypto: rockchip: use dev_err for error message about interrupt
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 13/17] x86: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 13/17] x86: use fallback for random_get_entropy() instead of zero
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/17] riscv: use fallback for random_get_entropy() instead of zero
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v6 08/17] riscv: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 08/17] riscv: use fallback for random_get_entropy() instead of zero
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix unsigned function returning negative constant
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v6 10/17] arm: use fallback for random_get_entropy() instead of zero
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 13/17] x86: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 13/17] x86: use fallback for random_get_entropy() instead of zero
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v4 2/5] virtio-crypto: use private buffer for control request
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v6 06/17] timekeeping: add raw clock fallback for random_get_entropy()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v6 06/17] timekeeping: add raw clock fallback for random_get_entropy()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/17] x86: use fallback for random_get_entropy() instead of zero
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v1] random: block in /dev/urandom
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v1] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v6 02/17] s390: define get_cycles macro for arch-override
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/17] s390: define get_cycles macro for arch-override
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 02/17] s390: define get_cycles macro for arch-override
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- RE: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] hwrng: optee-rng: remove redundant initialization to variable rng_size
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1] random: block in /dev/urandom
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] hex2bin: make the function hex_to_bin constant-time
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v6 03/17] parisc: define get_cycles macro for arch-override
- From: Helge Deller <deller@xxxxxx>
- [PATCH] hwrng: optee-rng: remove redundant initialization to variable rng_size
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v4 04/11] mips: use fallback for random_get_entropy() instead of zero
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: Re: Re: [PATCH v3 1/5] virtio-crypto: use private buffer for control request
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 5/5] virtio-crypto: enable retry for virtio-crypto-dev
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 4/5] virtio-crypto: adjust dst_len at ops callback
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 3/5] virtio-crypto: wait ctrl queue instead of busy polling
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 2/5] virtio-crypto: use private buffer for control request
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]