Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 20/20] crypto: qat - store vf.compatible flag
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 19/20] crypto: qat - do not export adf_iov_putmsg()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 18/20] crypto: qat - flush vf workqueue at driver removal
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 17/20] crypto: qat - remove the unnecessary get_vintmsk_offset()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 16/20] crypto: qat - fix naming of PF/VF enable functions
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 15/20] crypto: qat - complete all the init steps before service notification
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 14/20] crypto: qat - move IO virtualization functions
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 13/20] crypto: qat - fix naming for init/shutdown VF to PF notifications
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 12/20] crypto: qat - protect interrupt mask CSRs with a spinlock
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 11/20] crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 09/20] crypto: qat - remove intermediate tasklet for vf2pf
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 10/20] crypto: qat - fix reuse of completion variable
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 08/20] crypto: qat - rename compatibility version definition
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 07/20] crypto: qat - prevent spurious MSI interrupt in PF
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 06/20] crypto: qat - prevent spurious MSI interrupt in VF
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 05/20] crypto: qat - handle both source of interrupt in VF ISR
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 04/20] crypto: qat - do not ignore errors from enable_vf2pf_comms()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 03/20] crypto: qat - enable interrupts only after ISR allocation
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 02/20] crypto: qat - remove empty sriov_configure()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 01/20] crypto: qat - use proper type for vf_mask
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH 00/20] crypto: qat - cumulative fixes
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
Re: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 2/3] crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 3/3] crypto: tcrypt: add GCM/CCM mode test for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 0/3] support test GCM/CCM mode for SM4
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
From
: Christoph Hellwig <hch@xxxxxx>
[PATCH v2 0/2] crypto: hisilicon - some misc bugfix for SEC engine
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH] crypto: wp512: correct a non-kernel-doc comment
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: use kcalloc in mpi_resize
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 4/4] crypto: qat - fix a typo in a comment
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH v2 3/4] crypto: qat - disable AER if an error occurs in probe functions
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH v2 2/4] crypto: qat - set DMA mask to 48 bits for Gen2
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH v2 1/4] crypto: qat - simplify code and axe the use of a deprecated API
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
[PATCH v2 0/4] crypto: qat - fixes and cleanups
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 14/14] integrity: change ima link restriction to include mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 13/14] integrity: store reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 02/14] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 06/14] integrity: accessor function to get trust_moklist
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 04/14] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 00/14] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 08/14] KEYS: add a reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 07/14] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
From
: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
From
: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
[PATCH 1/2] dt-bindings: irqchip: convert Samsung Exynos IRQ combiner to dtschema
From
: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[PATCH v3 0/8] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 2/2] crypto: omap - Fix inconsistent locking of device lists
From
: Ben Hutchings <ben.hutchings@xxxxxxx>
[PATCH 1/2] crypto: omap - Avoid redundant copy when using truncated sg list
From
: Ben Hutchings <ben.hutchings@xxxxxxx>
[PATCH 0/2] omap-crypto fixes
From
: Ben Hutchings <ben.hutchings@xxxxxxx>
Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 07/13] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 12/13] nvmet-auth: expire authentication sessions
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 11/13] nvmet-auth: Diffie-Hellman key exchange support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 03/13] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 10/13] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 06/13] nvme-fabrics: decode 'authentication required' connect error
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 08/13] nvme-auth: Diffie-Hellman key exchange support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 05/13] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 09/13] nvmet: Parse fabrics commands on all queues
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCHv2 00/13] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 02/13] crypto: add crypto_has_kpp()
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 01/13] crypto: add crypto_has_shash()
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH] crypto: public_key: fix overflow during implicit conversion
From
: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 8/9] selftests: Initial TCP-AO support for nettest
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 6/9] tcp: authopt: Add key selection controls
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 7/9] tcp: authopt: Add snmp counters
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 5/9] tcp: authopt: Hook into tcp core
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 3/9] tcp: authopt: Add crypto initialization
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 4/9] tcp: authopt: Compute packet signatures
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 2/9] docs: Add user documentation for tcp_authopt
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 1/9] tcp: authopt: Initial support and key management
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
[RFCv2 0/9] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Bjorn Helgaas <helgaas@xxxxxxxxxx>
[PATCH] crypto: xts_crypt() return if walk.nbytes is 0
From
: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] fscrypt: support trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH] crypto: wp512: correct a non-kernel-doc comment
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH] asymmetric_keys: verify_pefile: fix kernel-doc notation
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 1/5] crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 2/5] crypto: hisilicon - add runtime PM ops
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 4/5] crypto: hisilicon - change parameter passing of debugfs function
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 5/5] crypto: hisilicon - check _PS0 and _PR0 method
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 0/5] crypto: hisilicon - support runtime PM for accelerator devices
From
: Weili Qian <qianweili@xxxxxxxxxx>
Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH 3/3] crypto: hisilicon - enable hpre device clock gating
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 2/3] crypto: hisilicon - enable sec device clock gating
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 1/3] crypto: hisilicon - enable zip device clock gating
From
: Weili Qian <qianweili@xxxxxxxxxx>
[PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
From
: Weili Qian <qianweili@xxxxxxxxxx>
Re: [PATCH] crypto: lib/sha256 - add sha256_value function
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
From
: Byungchul Park <byungchul.park@xxxxxxx>
[PATCH] crypto: lib/sha256 - add sha256_value function
From
: "Chen Li" <chenli@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Bjorn Helgaas <helgaas@xxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2] fscrypt: support trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: add missing kernel_fpu_end() call
From
: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
[PATCH 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 0/2] crypto: hisilicon - some misc bugfix for SEC engine
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 5/5] crypto: hisilicon/sec - use the correct print format
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH v2 0/5] crypto: hisilicon - some misc bugfix for SEC engine
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH] crypto: add missing kernel_fpu_end() call
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] crypto: add missing kernel_fpu_end() call
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[REPORT] Request for reviewing crypto code wrt wait_for_completion()
From
: Byungchul Park <byungchul.park@xxxxxxx>
Re: [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: add missing kernel_fpu_end() call
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH 4.19 16/16] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 4.19 15/16] padata: validate cpumask without removed CPU during offline
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Bjorn Helgaas <helgaas@xxxxxxxxxx>
Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH RFC v2 02/12] KEYS: CA link restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] lib/mpi: use kcalloc in mpi_resize
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
From
: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/38] Replace deprecated CPU-hotplug
From
: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
Re: [PATCH 00/38] Replace deprecated CPU-hotplug
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Ido Schimmel <idosch@xxxxxxxxxx>
Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
[PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
From
: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
[PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
From
: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
[PATCH 00/38] Replace deprecated CPU-hotplug
From
: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
[PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
From
: Jason Wang <wangborong@xxxxxxxxxx>
[PATCH 4.19 2/2] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
[PATCH 4.19 1/2] padata: validate cpumask without removed CPU during offline
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
[PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
[PATCH v2 6/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[crypto] ed610fb786: will-it-scale.per_thread_ops 4.6% improvement
From
: kernel test robot <oliver.sang@xxxxxxxxx>
Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
From
: Guenter Roeck <linux@xxxxxxxxxxxx>
Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v4 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v4 1/2] firmware: smccc: Register smccc_trng platform device
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH 5/5] crypto: hisilicon/sec - use the correct print format
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 0/5] crypto: hisilicon - some misc bugfix for SEC engine
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
From
: Kai Ye <yekai13@xxxxxxxxxx>
[PATCH 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
From
: Kai Ye <yekai13@xxxxxxxxxx>
Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Vlastimil Babka <vbabka@xxxxxxx>
[PATCH] crypto: add missing kernel_fpu_end() call
From
: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: David Gow <davidgow@xxxxxxxxxx>
Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 02/12] clk: mediatek: add mt7986 clock IDs
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v3 01/17] dt-bindings: qcom-bam: Convert binding to YAML
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
From
: Sean Wang <sean.wang@xxxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] crypto: ccp: shutdown SEV firmware on kexec
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC PATCH v1] fscrypt: support encrypted and trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 5/6] crypto: omap-sham - drop suspend and resume functions
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 4/6] crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 6/6] crypto: omap-sham - drop pm_runtime_irqsafe() usage
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 2/6] crypto: omap-sham - initialize req only after omap_sham_hw_init()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 3/6] crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
[PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
From
: Tony Lindgren <tony@xxxxxxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v3 1/2] firmware: smccc: Register smccc_trng platform device
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH v3 0/2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 02/12] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 00/12] Enroll kernel keys thru MOK
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 12/12] integrity: store reference to mok keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2] crypto: ccm - avoid negative wrapping of integers
From
: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: avoid negative wrapping of integers
From
: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH v3] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
Re: [PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
[PATCH 12/12] arm64: dts: mediatek: add mt7986b support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 11/12] arm64: dts: mediatek: add mt7986a support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 09/12] dt-bindings: serial: Add compatible for Mediatek MT7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 06/12] pinctrl: mediatek: add support for MT7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 03/12] clk: mediatek: add mt7986 clock support
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 02/12] clk: mediatek: add mt7986 clock IDs
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
[PATCH 00/12] Add basic SoC support for mediatek mt7986
From
: Sam Shih <sam.shih@xxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
From
: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
From
: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
Re: [RESEND] gpu: ipu-v3: use swap()
From
: Nicolas Ferre <nicolas.ferre@xxxxxxxxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: <Tudor.Ambarus@xxxxxxxxxxxxx>
Re: [RESEND] crypto: atmel-aes: use swap()
From
: <Tudor.Ambarus@xxxxxxxxxxxxx>
[RESEND] crypto: atmel-aes: use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
[RESEND] gpu: ipu-v3: use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Andreas Rammhold <andreas@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
[PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Mark Brown <broonie@xxxxxxxxxx>
[PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
From
: Mian Yousaf Kaukab <ykaukab@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Vladislav Bolkhovitin <vst@xxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
From
: Andre Przywara <andre.przywara@xxxxxxx>
[PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Jason Wang <wangborong@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 8/9] crypto: atmel-aes: Add fallback to XTS software implementation
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 4/9] crypto: atmel-aes: Add XTS input length constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 2/9] crypto: atmel-tdes: Handle error messages
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 5/9] crypto: atmel-aes: Add NIST 800-38A's zero length cryptlen constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 7/9] crypto: atmel-{aes, tdes}: Set OFB's blocksize to 1
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 9/9] crypto: atmel-aes: Allocate aes dev at tfm init time
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 6/9] crypto: atmel-tdes: Add FIPS81's zero length cryptlen constraint
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 3/9] crypto: atmel-aes: Add blocksize constraint for ECB and CBC modes
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 1/9] crypto: atmel-tdes: Clarify how tdes dev gets allocated to the tfm
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH v3 1/4] crypto: sm4 - create SM4 library based on sm4 generic code
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 3/4] crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3 4/4] crypto: tcrypt - add the asynchronous speed test for SM4
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
From
: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: David Ahern <dsahern@xxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] replace if with min
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH] replace if with min
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
Re: [RFC] tcp: Initial support for RFC5925 auth option
From
: Kuniyuki Iwashima <kuniyu@xxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[RFC] tcp: Initial support for RFC5925 auth option
From
: Leonard Crestez <cdleonard@xxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Simo Sorce <simo@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 08/11] nvmet: Parse fabrics commands on all queues
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: <Christian.Gromm@xxxxxxxxxxxxx>
Re: [PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Krzysztof Hałasa <khalasa@xxxxxxx>
Re: linux-next: Fixes tag needs some work in the crypto tree
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: linux-next: Fixes tag needs some work in the crypto tree
From
: Stephan Mueller <smueller@xxxxxxxxxx>
linux-next: Fixes tag needs some work in the crypto tree
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 4/4] dt-bindings: Remove PicoXcell bindings
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 07/11] nvme-auth: augmented challenge support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 06/11] nvme: Implement In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 02/11] crypto: add crypto_has_kpp()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH 01/11] crypto: add crypto_has_shash()
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [RFC PATCH 00/11] nvme: In-band authentication support
From
: Sagi Grimberg <sagi@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 10/11] nvmet-auth: implement support for augmented challenge
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 07/11] nvme-auth: augmented challenge support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 09/11] nvmet: Implement basic In-Band Authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 06/11] nvme: Implement In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 01/11] crypto: add crypto_has_shash()
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 08/11] nvmet: Parse fabrics commands on all queues
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 04/11] lib/base64: RFC4648-compliant base64 encoding
From
: Hannes Reinecke <hare@xxxxxxx>
[RFC PATCH 00/11] nvme: In-band authentication support
From
: Hannes Reinecke <hare@xxxxxxx>
[PATCH 02/11] crypto: add crypto_has_kpp()
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: DRBG - select SHA512
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: crypto: prefix additional module autoloading with "crypto-"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: fix flexible_array.cocci warnings
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
[RFC v1 2/2] crypto: tcrypt: call KUNIT_FAIL() instead of pr_err()
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
[RFC v1 0/2] crypto: tcrypt: small changes to run under KUnit
From
: Daniel Latypov <dlatypov@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
From
: Sean Anderson <sean.anderson@xxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Tom Lendacky <thomas.lendacky@xxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Joerg Roedel <jroedel@xxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v41 01/13] Linux Random Number Generator
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
From
: Sean Christopherson <seanjc@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
From
: Marc Orr <marcorr@xxxxxxxxxx>
Re: [PATCH v41 00/13] /dev/random - a new approach
From
: Alexander Lobakin <alobakin@xxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v41 01/13] Linux Random Number Generator
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 04/13] LRNG - add switchable DRNG support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 10/13] LRNG - add Jitter RNG fast noise source
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 02/13] LRNG - allocate one DRNG instance per NUMA node
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 12/13] LRNG - add interface for gathering of raw entropy
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 13/13] LRNG - add power-on and runtime self-tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 08/13] LRNG - add kernel crypto API PRNG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 06/13] crypto: DRBG - externalize DRBG functions for LRNG
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 03/13] LRNG - sysctls and /proc interface
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 11/13] LRNG - add SP800-90B compliant health tests
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 09/13] crypto: provide access to a static Jitter RNG state
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 05/13] LRNG - add common generic hash support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 07/13] LRNG - add SP800-90A DRBG extension
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v41 00/13] /dev/random - a new approach
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] use swap()
From
: Salah Triki <salah.triki@xxxxxxxxx>
[PATCH] replace if with min
From
: Salah Triki <salah.triki@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
From
: Peter Gonda <pgonda@xxxxxxxxxx>
Re: [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
From
: Peter Gonda <pgonda@xxxxxxxxxx>
[PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 4/5] certs: Factor out the blacklist hash creation
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 3/5] certs: Make blacklist_vet_description() more strict
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 0/3] crypto: qat - Fixes and clean-ups
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH] X.509: Support parsing certificate using SM2 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/6 v2] arm: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/6 v2] treewide: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 2/6 v2] hw_random: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 3/6 v2] lib: crypto: rename 'mod_init' & 'mod_exit' functions to be module-specific
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 1/3] crypto: qat - Simplify code and axe the use of a deprecated API
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 3/3] crypto: qat - Fix a typo in a comment
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 2/3] crypto: qat - Disable AER if an error occurs in probe functions
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]