Linux Crypto
[Prev Page][Next Page]
- [PATCH v2] ath9k: use hw_random API instead of directly dumping into random.c
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] ath9k: use hw_random API instead of directly dumping into random.c
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] ath9k: use hw_random API instead of directly dumping into random.c
- From: Toke Høiland-Jørgensen <toke@xxxxxxx>
- Re: [PATCH] ath9k: use hw_random API instead of directly dumping into random.c
- From: Rui Salvaterra <rsalvaterra@xxxxxxxxx>
- [PATCH v3] random: absorb fast pool into input pool after fast load
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v1 1/1] crypto: cavium/nitrox - don't cast parameter in bit operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] KEYS: remove support for asym_tpm keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] treewide: Replace zero-length arrays with flexible-array members
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH][next] treewide: Replace zero-length arrays with flexible-array members
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH][next] treewide: Replace zero-length arrays with flexible-array members
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v1 1/1] crypto: cavium/nitrox - don't cast parameter in bit operations
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/2] crypto: vmx: Turn CRYPTO_DEV_VMX_ENCRYPT into tristate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/2] crypto: vmx: Add missing dependencies
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/2] vmx-crypto: Add missing dependencies
- From: Petr Vorel <pvorel@xxxxxxx>
- [no subject]
- [no subject]
- Re: [PATCH][next] treewide: Replace zero-length arrays with flexible-array members
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH][next] treewide: Replace zero-length arrays with flexible-array members
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH] crypto: crypto_xor - use helpers for unaligned accesses
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] ath9k: use hw_random API instead of directly dumping into random.c
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v1 1/1] crypto: cavium/nitrox - don't cast parameter in bit operations
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- ath9k should perhaps use hw_random api?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - get rid of alg_memory_allocated
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Johan Jonker <jbx6244@xxxxxxxxx>
- Re: [PATCH] crypto: crypto_xor - use helpers for unaligned accesses
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: crypto_xor - use helpers for unaligned accesses
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/1] crypto: vmx: Fix missing dependencies during boot
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] crypto: vmx: Fix missing dependencies during boot
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH 0/9] use GFP_KERNEL
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- [PATCH -next] hwrng: core: Remove duplicated include in core.c
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Finn Thain <fthain@xxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: vmx: Fix missing dependencies during boot
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3] random: use simpler fast key erasure flow on per-cpu keys
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH RFC v0] random: block in /dev/urandom
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: (subset) [PATCH 0/9] use GFP_KERNEL
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 15/17] efi/mokvar: move up init order
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 13/17] integrity: store reference to machine keyring
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH v8 10/17] KEYS: add a reference to machine keyring
- From: Darren Kenny <darren.kenny@xxxxxxxxxx>
- Re: [PATCH] random: pull add_hwgenerator_randomness() declaration into random.h
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v3 11/15] crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH v3 07/15] crypto: dh - implement ffdheXYZ(dh) templates
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [no subject]
- Re: [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Johan Jonker <jbx6244@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 3/4] hw_random: use per-rng quality value instead of global setting
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] hw_random: introduce rng_quality sysfs attribute
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] hw_random: start and stop in-kernel rngd in separate function
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] hw_random: do not bother to order list of devices by quality
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] hw_random: introduce rng_quality sysfs attribute
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] random: pull add_hwgenerator_randomness() declaration into random.h
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: af_alg - get rid of alg_memory_allocated
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: pull add_hwgenerator_randomness() declaration into random.h
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] random: pull add_hwgenerator_randomness() declaration into random.h
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Joshua Kinard <kumba@xxxxxxxxxx>
- __dma_async_device_channel_unregister called while 2 clients hold a reference
- From: jkhsjdhjs <jkhsjdhjs@xxxxxxxxxxx>
- Re: [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/9] use GFP_KERNEL
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Finn Thain <fthain@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 00/22] Enable Qualcomm Crypto Engine on sm8150 & sm8250
- From: Jordan Crouse <jorcrous@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC v0] random: block in /dev/urandom
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v0] random: block in /dev/urandom
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH v2 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- Re: [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v7] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v7] random: defer fast pool mixing to worker
- From: Sultan Alsawaf <sultan@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH v7] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH v6] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v5] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Johan Jonker <jbx6244@xxxxxxxxx>
- [PATCH v5] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: rockchip: ECB does not need IV
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PACTH v4 0/3] dt-bindings: crypto: Convert atmel-crypto to YAML
- From: <Claudiu.Beznea@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce support for QAT Dynamic Power Management
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PACTH v4 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v4 3/3] dt-bindings: crypto: Convert Atmel SHA to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v4 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v4 0/3] dt-bindings: crypto: Convert atmel-crypto to YAML
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce support for QAT Dynamic Power Management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] xor: enable auto-vectorization in Clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-tdes: Add support for the TDES IP available on sama7g5 SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce support for QAT Dynamic Power Management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: HMAC - disallow keys < 112 bits in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2 - add synchronization between mailbox accesses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - add the register configuration for HW V3
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v3 07/15] crypto: dh - implement ffdheXYZ(dh) templates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 11/15] crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PACTH v3 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Claudiu.Beznea@xxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: Introduce RSA algorithm
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 2/3] virtio_crypto: Support virtio crypto asym operation
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 1/3] virtio-crypto: header update
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 0/3] Support akcipher for virtio-crypto
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 3/3] virtio-crypto: implement RSA algorithm
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 2/3] virtio-crypto: introduce akcipher service
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 1/3] virtio_crypto: Introduce VIRTIO_CRYPTO_NOSPC
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v2 0/3] Introduce akcipher service for virtio-crypto
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PACTH v3 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PACTH v3 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PACTH v3 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v3 3/3] dt-bindings: crypto: Convert Atmel SHA to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v3 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PACTH v3 0/3] dt-bindings: crypto: Convert atmel-crypto to YAML
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto/nx: Constify static attribute_group structs
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH] random: ensure mix_interrupt_randomness() is consistent
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [RFC PATCH v2 6/7] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 7/7] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 4/7] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 3/7] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 1/7] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 2/7] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH v2 0/7] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH 4/9] crypto: use GFP_KERNEL
- From: Julia Lawall <Julia.Lawall@xxxxxxxx>
- [PATCH 0/9] use GFP_KERNEL
- From: Julia Lawall <Julia.Lawall@xxxxxxxx>
- [PATCH 3/3] crypto/nx: Constify static attribute_group structs
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH 2/3] crypto: omap-sham - Constify static attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH 1/3] crypto: omap-aes - Constify static attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH 0/3] drivers/crypto: Constify static attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- Re: [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v4 1/2] random: remove batched entropy locking
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH v2] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 3/4] random: get_source_long() function
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 2/4] random: Add a pseudorandom generator based on the xtea cipher
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 4/4] random: Apply get_source_long() in several places
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/4] random: change usage of arch_get_random_long()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 0/4] random: change usage of arch_get_random_long()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] random: Add a pseudorandom generator based on the xtea cipher
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] random: Add a pseudorandom generator based on the xtea cipher
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] random: get_source_long() function
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH 1/4] random: Simple utility functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] random: Apply get_source_long() in several places
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 3/4] random: get_source_long() function
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 2/4] random: Add a pseudorandom generator based on the xtea cipher
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Subject: [PATCH 1/4] random: Simple utility functions
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 0/4] random: change usage of arch_get_random_long()
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: qat - enable power management for QAT GEN4
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH v2 2/3] crypto: qat - move and rename GEN4 error register definitions
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH v2 1/3] crypto: qat - add misc workqueue
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH v2 0/3] Introduce support for QAT Dynamic Power Management
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- Re: [PATCH] random: fix locking for crng_init in crng_reseed()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [syzbot] KCSAN: data-race in random_recv_done / virtio_read
- From: syzbot <syzbot+9f00f7796f970f61ce79@xxxxxxxxxxxxxxxxxxxxxxxxx>
- RE: RE: [PATCH 2/3] virtio-crypto: introduce akcipher service
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: RE: [PATCH 2/3] virtio-crypto: introduce akcipher service
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- RE: [PATCH 2/3] virtio-crypto: introduce akcipher service
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: PING: [PATCH 0/3] Introduce akcipher service for virtio-crypto
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH 1/3] virtio_crypto: Introduce VIRTIO_CRYPTO_NOSPC
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: PING: [PATCH 0/3] Introduce akcipher service for virtio-crypto
- From: Jason Wang <jasowang@xxxxxxxxxx>
- PING: [PATCH 0/3] Introduce akcipher service for virtio-crypto
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH] random: fix locking for crng_init in crng_reseed()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lrw - Add dependency on ecb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: xts - Add softdep on ecb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: atmel,at91-trng: update maintainers entry
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] random: fix locking for crng_init in crng_reseed()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v1 1/1] crypto: qat - don't cast parameter in bit operations
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] random: fix locking for crng_init in crng_reseed()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.17
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v1 1/1] crypto: qat - don't cast parameter in bit operations
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [BUG] crypto: ccree: driver does not handle case where cryptlen = authsize =0
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 2/2] random: defer fast pool mixing to worker
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 0/2] random: PREEMPT_RT fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 1/2] random: remove batched entropy locking
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH] dt-bindings: crypto: convert rockchip-crypto to yaml
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] dt-bindings: crypto: rockchip: fix a typo on crypto-controller
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v2 5/9] random: do not xor RDRAND when writing into /dev/random
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/9] random: ensure early RDSEED goes through mixer on init
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/9] random: use hash function for crng_slow_load()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] random: use simpler fast key erasure flow on per-cpu keys
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 6/9] random: absorb fast pool into input pool after fast load
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 5/9] random: do not xor RDRAND when writing into /dev/random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 4/9] random: ensure early RDSEED goes through mixer on init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] dt-bindings: crypto: rockchip: fix a typo on crypto-controller
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v2 3/9] random: inline leaves of rand_initialize()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 2/9] random: get rid of secondary crngs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: cavium/nitro: fix typo on crypto
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [BUG] crypto: ccree: driver does not handle case where cryptlen = authsize =0
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 6/9] random: absorb fast pool into input pool after fast load
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/9] random: get rid of secondary crngs
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] random: use simpler fast key erasure flow on per-cpu keys
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] random: inline leaves of rand_initialize()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] random: use RDSEED instead of RDRAND in entropy extraction
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccree: fix xts-aes-ccree blocksize
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/9] random: cleanups around per-cpu crng & rdrand
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 1/9] random: use RDSEED instead of RDRAND in entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 2/9] random: get rid of secondary crngs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 3/9] random: inline leaves of rand_initialize()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 6/9] random: absorb fast pool into input pool after fast load
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 7/9] random: use simpler fast key erasure flow on per-cpu keys
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 4/9] random: ensure early RDSEED goes through mixer on init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 5/9] random: do not xor RDRAND when writing into /dev/random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 8/9] random: use hash function for crng_slow_load()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 9/9] random: remove outdated INT_MAX >> 6 check in urandom_read()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v1 6/7] random: use simpler fast key erasure flow on per-cpu keys
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v1 6/7] random: use simpler fast key erasure flow on per-cpu keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 5/7] random: do not xor RDRAND when writing into /dev/random
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 4/7] random: ensure early RDSEED goes through mixer on init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/7] random: inline leaves of rand_initialize()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 1/7] random: use RDSEED instead of RDRAND in entropy extraction
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: qat - enable power management for QAT GEN4
- From: kernel test robot <lkp@xxxxxxxxx>
- ath9k should perhaps use hw_random api?
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] dt-bindings: crypto: Convert Atmel SHA to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH v1 5/7] random: do not xor RDRAND when writing into /dev/random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 6/7] random: use simpler fast key erasure flow on per-cpu keys
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 7/7] random: remove outdated INT_MAX >> 6 check in urandom_read()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 4/7] random: ensure early RDSEED goes through mixer on init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 3/7] random: inline leaves of rand_initialize()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 1/7] random: use RDSEED instead of RDRAND in entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 2/7] random: get rid of secondary crngs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v1 0/7] random: cleanups around per-cpu crng & rdrand
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 8/8] hisi_acc_vfio_pci: Use its own PCI reset_done error handler
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 1/8] crypto: hisilicon/qm: Move the QM header to include/linux
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 0/8] vfio/hisilicon: add ACC live migration driver
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 2/8] crypto: hisilicon/qm: Move few definitions to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 3/8] hisi_acc_qm: Move PCI device IDs to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 0/3] crypto: Convert atmel-crypto to YAML
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 3/3] dt-bindings: crypto: Convert Atmel SHA to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: remove support for asym_tpm keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: asym_tpm: fix buffer overreads in extract_key_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] KEYS: asymmetric: enforce SM2 signature use pkey algo
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 0/5] random: use computational hash for entropy extraction, and related fixes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/2] Fix bugs in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 2/3] dt-bindings: crypto: Convert Atmel TDES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/3] dt-bindings: crypto: Convert Atmel SHA to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/3] dt-bindings: crypto: Convert atmel-{aes,tdes,sha} to YAML
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/3] dt-bindings: crypto: Convert Atmel AES to yaml
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] Common entropy source and DRNG management
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/5] random: always wake up entropy writers after extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 4/5] random: always wake up entropy writers after extraction
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] random: make credit_entropy_bits() always safe
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 3/5] random: use linear min-entropy accumulation crediting
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 4/5] random: always wake up entropy writers after extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 2/5] random: simplify entropy debiting
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 1/5] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 0/5] random: use computational hash for entropy extraction, and related fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 1/2] lib/xor: make xor prototypes more friendly to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: arm/xor - make vectorized C code Clang-friendly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 0/2] xor: enable auto-vectorization in Clang
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] random: fix locking in crng_fast_load()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] random: fix locking in crng_fast_load()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 3/4] random: use linear min-entropy accumulation crediting
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/4] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/4] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] random: fix locking in crng_fast_load()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] random: fix write locking for crng_init
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] random: fix locking for crng_init in crng_reseed()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] random: make credit_entropy_bits() always safe
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: remove use_input_pool parameter from crng_reseed()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] random: use computational hash for entropy extraction
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] random: simplify entropy debiting
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: arm/xor - make vectorized C code Clang-friendly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 0/2] xor: enable auto-vectorization in Clang
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] random: use linear min-entropy accumulation crediting
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: sl3516: remove redundant initializations of pointers in_sg and out_sg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/octeontx: remove redundant initialization of variable c_size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: octeontx2: remove CONFIG_DM_CRYPT check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - remove all multibuffer ahash tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: arm - simplify bit sliced AES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-neon-ctr - improve handling of single tail block
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: increase CPT HW instruction queue length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: disable DMA black hole on an DMA fault
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: CN10K CPT to RNM workaround
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] hw_random: explicit ordering of initcalls
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: engine: disable BH during completion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Common entropy source and DRNG management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] random: remove use_input_pool parameter from crng_reseed()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] random: remove use_input_pool parameter from crng_reseed()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v2 3/4] random: use linear min-entropy accumulation crediting
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 1/4] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 4/4] random: make credit_entropy_bits() always safe
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 2/4] random: simplify entropy debiting
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 0/4] random: use computational hash for entropy extraction, and related fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: atmel-tdes: Add support for the TDES IP available on sama7g5 SoC
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: octeontx2 - add synchronization between mailbox accesses
- From: Harman Kalra <hkalra@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/15] crypto: dh - infrastructure for NVM in-band auth and FIPS conformance
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/3] crypto: qat - enable power management for QAT GEN4
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 1/3] crypto: qat - add misc workqueue
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 2/3] crypto: qat - move and rename GEN4 error register definitions
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 0/3] Introduce support for QAT Dynamic Power Management
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] random.c Remove locking in extract_buf()
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 6/7] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 12/15] crypto: api - allow algs only in specific constructions in FIPS mode
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 13/15] crypto: dh - disallow plain "dh" usage in FIPS mode
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 15/15] crypto: dh - calculate Q from P for the full public key verification
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 14/15] lib/mpi: export mpi_rshift
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 11/15] crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 09/15] crypto: dh - implement private key generation primitive for ffdheXYZ(dh)
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 06/15] crypto: dh - introduce common code for built-in safe-prime group support
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 03/15] crypto: dh - remove struct dh's ->q member
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 05/15] crypto: dh - split out deserialization code from crypto_dh_decode()
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 10/15] crypto: testmgr - add keygen tests for ffdheXYZ(dh) templates
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 07/15] crypto: dh - implement ffdheXYZ(dh) templates
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 08/15] crypto: testmgr - add known answer tests for ffdheXYZ(dh) templates
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 04/15] crypto: dh - constify struct dh's pointer members
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 02/15] crypto: kpp - provide support for KPP spawns
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 01/15] crypto: kpp - provide support for KPP template instances
- From: Nicolai Stange <nstange@xxxxxxx>
- [PATCH v3 00/15] crypto: dh - infrastructure for NVM in-band auth and FIPS conformance
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [v2 PATCH] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1)
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Move cryptomgr soft dependency into algapi
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: your patch "crypto: api - Fix built-in testing dependency failures"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: api - Move cryptomgr soft dependency into algapi
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 6/7] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] random: use computational hash for entropy extraction
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- [PATCH] random: use computational hash for entropy extraction
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random.c Remove locking in extract_buf()
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random.c Remove locking in extract_buf()
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - remove all multibuffer ahash tests
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: HMAC - disallow keys < 112 bits in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: HMAC - add fips_skip support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: HMAC - disallow keys < 112 bits in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] Fix bugs in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v2 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: arm/xor - make vectorized C code Clang-friendly
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 2/2] random: only call crng_finalize_init() for primary_crng
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- your patch "crypto: api - Fix built-in testing dependency failures"
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: atmel,at91-trng: update maintainers entry
- From: <Claudiu.Beznea@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: atmel,at91-trng: update maintainers entry
- From: <Ludovic.Desroches@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - enable prediction resistance conditionally
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sl3516: remove redundant initializations of pointers in_sg and out_sg
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- [PATCH] crypto: marvell/octeontx: remove redundant initialization of variable c_size
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH 2/2] random: only call crng_finalize_init() for primary_crng
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/2] random: access primary_pool directly rather than through pointer
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/2] random: only call crng_finalize_init() for primary_crng
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] random: access primary_pool directly rather than through pointer
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] dt-bindings: rng: atmel,at91-trng: update maintainers entry
- From: <nicolas.ferre@xxxxxxxxxxxxx>
- Re: [PATCH] random.c Remove locking in extract_buf()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] random.c Remove locking in extract_buf()
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH v2 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: arm/xor - make vectorized C code Clang-friendly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/2] xor: enable auto-vectorization in Clang
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5-fix 08/12] x86/PM/keylocker: Restore internal wrapping key on resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] KEYS: remove support for asym_tpm keys
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] KEYS: remove support for asym_tpm keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: asym_tpm: fix buffer overreads in extract_key_parameters()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/7] Common entropy source and DRNG management
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- caam: Possible caam-rng regression since enabling prediction resistance
- From: Clemens Gruber <clemens.gruber@xxxxxxxxxxxx>
- Re: [PATCH 0/7] Common entropy source and DRNG management
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1)
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [RFC PATCH 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] crypto: octeontx2: remove CONFIG_DM_CRYPT check
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
- Re: [PATCH] crypto: caam - enable prediction resistance conditionally
- From: Fabio Estevam <festevam@xxxxxxxxx>
- RE: [EXT] Re: [PATCH v2] crypto: octeontx2: fix NULL pointer dereference
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
- [PATCH] crypto: tcrypt - remove all multibuffer ahash tests
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - enable prediction resistance conditionally
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: Kavyasree Kotagiri <kavyasree.kotagiri@xxxxxxxxxxxxx>
- [PATCH v2 6/6] hw_random: credit entropy for low quality sources of randomness
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: tcrypt - add asynchronous speed test for SM3
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/54] kernel: replace cpumask_weight with cpumask_empty in padata.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Fix scatterlist processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: select CONFIG_NET_DEVLINK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: memneq: avoid implicit unaligned accesses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: rsa-pkcs1pad fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix access to PFVF interrupt registers for GEN4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: really disable hash on A80
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] arm64: accelerate crc32_be
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86 - Convert to SPDX identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: octeontx2 - Avoid stack variable overflow
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto/cpp: remove redundant ret variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - enable prediction resistance conditionally
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix a signedness bug in get_service_enabled()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Introduce x86 assembly accelerated implementation for SM3 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Documentation: update debugfs doc for Hisilicon Accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: HMAC - disallow keys < 112 bits in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: octeontx2: fix NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: HMAC - disallow keys < 112 bits in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: tcrypt - add asynchronous speed test for SM3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: PROBLEM: encryption test failures since "crypto: mxs-dcp - Use sg_mapping_iter to copy data"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: RFC random(4) We don't need no steenking ...
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: RFC random(4) We don't need no steenking ...
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH 0/2] xor: enable auto-vectorization in Clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH 1/7] crypto: xctr - Add XCTR support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 1/7] crypto: xctr - Add XCTR support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: RFC random(4) We don't need no steenking ...
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: PROBLEM: encryption test failures since "crypto: mxs-dcp - Use sg_mapping_iter to copy data"
- From: Christian Eggers <ceggers@xxxxxxx>
- Re: PROBLEM: encryption test failures since "crypto: mxs-dcp - Use sg_mapping_iter to copy data"
- From: Sean Anderson <sean.anderson@xxxxxxxx>
- PROBLEM: encryption test failures since "crypto: mxs-dcp - Use sg_mapping_iter to copy data"
- From: Christian Eggers <ceggers@xxxxxxx>
- Re: [PATCH] crypto: authenc - Fix sleep in atomic context in decrypt_tail
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: engine: disable BH during completion
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 3/3] crypto: arm64/aes-neonbs-xts - use plain NEON for non-power-of-2 input sizes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] crypto: arm64/aes-neonbs-ctr - fallback to plain NEON for final chunk
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/3] crypto: arm/aes-neonbs-ctr - deal with non-multiples of AES block size
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/3] crypto: arm - simplify bit sliced AES
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
- [PATCH] crypto: arm64/aes-neon-ctr - improve handling of single tail block
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 1/7] crypto: xctr - Add XCTR support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RFC random(4) We don't need no steenking ...
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 2/2] crypto: arm/xor - make vectorized C code Clang-friendly
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] lib/xor: make xor prototypes more friendely to compiler vectorization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] xor: enable auto-vectorization in Clang
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: atmel: add support for AES and SHA IPs available on lan966x SoC
- From: Kavyasree Kotagiri <kavyasree.kotagiri@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 1/7] crypto: xctr - Add XCTR support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/7] crypto: polyval - Add POLYVAL support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: algapi - Remove test larvals to fix error paths
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi - Remove test larvals to fix error paths
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] crypto: sun8i-ce: do not allocate memory when handling requests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Lockless /dev/random - Performance/Security/Stability improvement
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v2] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: John Stultz <john.stultz@xxxxxxxxxx>
- Re: [PATCH 0/7] Common entropy source and DRNG management
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/8] crypto: sun8i-ss: handle requests if last block is not modulo 64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 7/8] crypto: sun8i-ss: test error before assigning
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 6/8] crypto: sun8i-ss: remove redundant test
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 4/8] crypto: sun8i-ss: do not allocate memory when handling hash requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 3/8] crypto: sun8i-ss: handle zero sized sg
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 2/8] crypto: sun4i-ss: do not allocate backup IV on requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 5/8] crypto: sun8i-ss: do not zeroize all pad
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 1/8] crypto: sun8i-ce: do not allocate memory when handling requests
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 0/8] crypto: allwinner: various improvments
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] random: continually use hwgenerator randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: algapi - Remove test larvals to fix error paths
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- [PATCH] crypto: algapi - Remove test larvals to fix error paths
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: asym_tpm: fix buffer overreads in extract_key_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: asym_tpm: fix buffer overreads in extract_key_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KEYS: x509: various cleanups
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KEYS: x509: various cleanups
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: x509: clearly distinguish between key and signature algorithms
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KEYS: x509: remove unused fields
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KEYS: x509: remove dead code that set ->unsupported_sig
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: x509: remove never-set ->unsupported_key flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: fix length validation in keyctl_pkey_params_get_2()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: DRBG - remove internal reseeding operation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: DRBG - remove internal reseeding operation
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [v2 PATCH] crypto: api - Disallow sha1 in FIPS-mode while allowing hmac(sha1)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/7] crypto: DRBG - remove internal reseeding operation
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/7] Common entropy source and DRNG management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/7] crypto: AF_ALG - remove ALG_SET_DRBG_ENTROPY interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 3/7] crypto: Entropy Source and DRNG Manager
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 5/7] crypto: ESDM - add Jitter RNG entropy source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 6/7] crypto: ESDM - add Kernel RNG entropy source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 4/7] crypto: move Jitter RNG header include dir
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 7/7] crypto: ESDM - add kernel crypto API RNG interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5 4/6] module: strip the signature marker in the verification function.
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] random: continually use hwgenerator randomness
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] crypto: octeontx2: disable DMA black hole on an DMA fault
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
- [PATCH] crypto: octeontx2: CN10K CPT to RNM workaround
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
- [PATCH] crypto: octeontx2: increase CPT HW instruction queue length
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
- Re: [PATCH v2] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: (subset) [PATCH v4 00/14] Update the Icicle Kit device tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 7/7] crypto: arm64/polyval: Add PMULL accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 6/7] crypto: x86/polyval: Add PCLMULQDQ accelerated implementation of POLYVAL
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 3/7] crypto: hctr2 - Add HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 5/7] crypto: arm64/aes-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 4/7] crypto: x86/aesni-xctr: Add accelerated implementation of XCTR
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 1/7] crypto: xctr - Add XCTR support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 2/7] crypto: polyval - Add POLYVAL support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [RFC PATCH 0/7] crypto: HCTR2 support
- From: Nathan Huckleberry <nhuck@xxxxxxxxxx>
- [PATCH 5.16 0837/1039] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.16 0663/1039] crypto: ccp - Move SEV_INIT retry for corrupted data
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 442/563] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 670/846] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- hid-u2fzero.c - hw_random quality set to 1?
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] hw_random: credit entropy for low quality sources of randomness
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH 5.15 562/846] crypto: ccp - Move SEV_INIT retry for corrupted data
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] hw_random: only set cur_rng_set_by_user if it is working
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] hw_random: explicit ordering of initcalls
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] hw_random: break out of hwrng_fillfn if current rng is not trusted
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] hw_random: use rng_fillbuf in add_early_randomness()
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] hw_random: read() callback must be called for size of 32 or more bytes
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 207/239] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 247/320] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: xilinx: Add Xilinx SHA3 driver
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 4.14 157/186] crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/20] tcp: Initial support for RFC5925 auth option
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [EXT] [RFC PATCH] crypto: caam - restore retry count after HW RNG failure
- From: Petr Benes <petrben@xxxxxxxxx>
- [PATCH v5 20/20] tcp: authopt: Try to respect rnextkeyid from SYN on SYNACK
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 19/20] selftests: net/fcnal: Initial tcp_authopt support
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 14/20] tcp: authopt: Add NOSEND/NORECV flags
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 10/20] tcp: authopt: Add support for signing skb-less replies
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 17/20] selftests: nettest: Rename md5_prefix to key_addr_prefix
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 16/20] tcp: authopt: Add /proc/net/tcp_authopt listing all keys
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 18/20] selftests: nettest: Initial tcp_authopt support
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 15/20] tcp: authopt: Add prefixlen support
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 13/20] tcp: authopt: Add initial l3index support
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 11/20] tcp: ipv4: Add AO signing for skb-less replies
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 12/20] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 08/20] tcp: authopt: Implement Sequence Number Extension
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 07/20] tcp: authopt: Disable via sysctl by default
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 09/20] tcp: ipv6: Add AO signing for tcp_v6_send_response
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 05/20] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 04/20] tcp: md5: Refactor tcp_sig_hash_skb_data for AO
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 06/20] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 03/20] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 02/20] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 01/20] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v5 00/20] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- RE: [EXT] [RFC PATCH] crypto: caam - restore retry count after HW RNG failure
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
- From: Antony Vennard <antony@xxxxxxxxxx>
- [PATCH 21/54] kernel: replace cpumask_weight with cpumask_empty in padata.c
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 3/4] crypto: xilinx: Add Xilinx SHA3 driver
- From: Harsha <harsha.harsha@xxxxxxxxxx>
- [PATCH 4/4] MAINTAINERS: Add maintainer for Xilinx ZynqMP SHA3 driver
- From: Harsha <harsha.harsha@xxxxxxxxxx>
- [PATCH 2/4] firmware: xilinx: Add ZynqMP SHA API for SHA3 functionality
- From: Harsha <harsha.harsha@xxxxxxxxxx>
- [PATCH 1/4] drivers: crypto: Updated Makefile for xilinx subdirectory
- From: Harsha <harsha.harsha@xxxxxxxxxx>
- [PATCH 0/4] crypto: Add Xilinx ZynqMP SHA3 driver support
- From: Harsha <harsha.harsha@xxxxxxxxxx>
- [PATCH] crypto: mxs-dcp - Fix scatterlist processing
- From: "Tomas Paukrt" <tomaspaukrt@xxxxxxxx>
- [PATCH v2] crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 2/5] crypto: hisilicon/sec - add some comments for soft fallback
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 5/5] crypto: hisilicon/sec - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 3/3] virtio-crypto: implement RSA algorithm
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] virtio-crypto: implement RSA algorithm
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: memneq: avoid implicit unaligned accesses
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: octeontx2: fix NULL pointer dereference
- From: Shijith Thotton <sthotton@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]