Linux Crypto
[Prev Page][Next Page]
- [Patch v4 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v1 2/2] caam: imx8m: change to use of_match_node in run_descriptor_deco0
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v1 2/2] caam: imx8m: change to use of_match_node in run_descriptor_deco0
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- [PATCH v1 1/2] caam: imx8m: fix the built-in caam driver cannot match soc_id
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- Re: [PATCH v6,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] hwrng: amd: remove redundant initialization of variable err
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v6,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v6,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v6 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v6,1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v6,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] Revert "crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [kbuild] Re: [Patch v3 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] Revert "crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- AW: [PATCH] crypto: cavium - Use 'hlist_for_each_entry' to simplify code
- From: Walter Harms <wharms@xxxxxx>
- [PATCH] Revert "crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cavium - Use 'hlist_for_each_entry' to simplify code
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] macvlan: Use 'hash' iterators to simplify code
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [GIT PULL][PATCH v10 0/4] Update to zstd-1.4.10
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [GIT PULL][PATCH v10 0/4] Update to zstd-1.4.10
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [GIT PULL][PATCH v10 0/4] Update to zstd-1.4.10
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxxxxxx>
- Announce loop-AES-v3.7u file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] lib: zstd: Upgrade to latest upstream zstd version 1.4.10
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v10 4/4] MAINTAINERS: Add maintainer entry for zstd
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v10 2/4] lib: zstd: Add decompress_sources.h for decompress_unzstd
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v10 1/4] lib: zstd: Add kernel-specific API
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [GIT PULL][PATCH v10 0/4] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 5.13
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Update for 5.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: arm64: generate *.S by Perl at build time instead of shipping them
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: arm64: generate *.S by Perl at build time instead of shipping them
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: arm64: generate *.S by Perl at build time instead of shipping them
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v4] crypto: ccp: Annotate SEV Firmware file names
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH 2/4] crypto: arm: use a pattern rule for generating *.S files
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/4] crypto: arm64: generate *.S by Perl at build time instead of shipping them
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/4] crypto: arm: generate *.S by Perl at build time instead of shipping them
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 4/4] crypto: arm64: use a pattern rule for generating *.S files
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp: Annotate SEV Firmware file names
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3] crypto: ccp: Annotate SEV Firmware file names
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v2] crypto: ccp: Annotate SEV Firmware file names
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH] crypto: ccp: Annotate SEV Firmware file names
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: exynos - Fix runtime PM imbalance on error
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: exynos - Fix runtime PM imbalance on error
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2] hwrng: exynos - Fix runtime PM imbalance on error
- From: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
- Re: [PATCH v2] hwrng: exynos - Fix runtime PM imbalance on error
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH v2] hwrng: exynos - Fix runtime PM imbalance on error
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH] hwrng: exynos - Fix runtime PM imbalance on error
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: camellia: drop duplicate "depends on CRYPTO"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: s5p-sss - simplify getting of_device_id match data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ccp: ccp - add support for Green Sardine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2: add support for OcteonTX2 98xx CPT block.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] chelsio/chcr: Remove useless MODULE_VERSION
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: cryp: Remove duplicate argument
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio - remove unused function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Update dt-bindings and sa2ul driver for AM64x SoCs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: hisilicon - adapt hardware error type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix kernel-doc notation in chacha.c and af_alg.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: cortina/gemini: hwrng: what is its quality ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 16/16] crypto/nx: Add sysfs interface to export NX capabilities
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 14/16] crypto/nx: Register and unregister VAS interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 13/16] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: cortina/gemini: hwrng: what is its quality ?
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: cortina/gemini: hwrng: what is its quality ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v3 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: kernel test robot <lkp@xxxxxxxxx>
- cortina/gemini: hwrng: what is its quality ?
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/1 v10] x86/power use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/1 v10] x86/power use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 18/18] keyctl_pkey: Add pkey parameters saltlen and mgfhash for PSS
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH 1/1 v10] x86/power use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [RFC v1 PATCH 1/3] drivers: soc: add support for soc_device_match returning -EPROBE_DEFER
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v3 12/18] crypto: rsa-psspad: Introduce shash alloc/dealloc helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 11/18] crypto: Scaffolding for RSA-PSS signature style
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 13/18] crypto: rsa-psspad: Get signature parameters from a given signature
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 10/18] crypto: rsa: Move struct rsa_mpi_key definition to rsa.h
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v2 00/18] Implement RSASSA-PSS signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v2 18/18] keyctl_pkey: Add pkey parameters slen and mgfhash for PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 18/18] keyctl_pkey: Add pkey parameters saltlen and mgfhash for PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 16/18] crypto: rsa-psspad: Implement signature verify callback
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 15/18] crypto: rsa-psspad: Provide PSS signature verify operation
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 14/18] crypto: Implement MGF1 Mask Generation Function for RSASSA-PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 09/18] crypto: Extend akcipher API to pass signature parameters
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 08/18] crypto: rsa: Move rsapad_akcipher_setup_child and callback to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 07/18] crypto: rsa: Move more common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 06/18] crypto: rsa: Start moving RSA common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 05/18] crypto: rsa-pkcs1pad: Rename pkcs1pad_* structs to rsapad_*
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 04/18] crypto: rsa-pkcs1pad: Pull out child req processing code into helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 03/18] crypto: rsa-pkcs1pad: Extract pkcs1pad_create into a generic helper
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 02/18] crypto: rsa-pkcs1pad: Rename pkcs1pad-specific functions to rsapad
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v3 00/18] Implement RSASSA-PSS signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 1/1 v9] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: joeyli <jlee@xxxxxxxx>
- [Patch v3 7/7] crypto: qce: aead: Schedule fallback algorithm
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 3/7] crypto: qce: Add mode for rfc4309
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 5/7] crypto: qce: common: Clean up qce_auth_cfg
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 4/7] crypto: qce: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 2/7] crypto: qce: common: Make result dump optional
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v3 1/7] crypto: qce: common: Add MAC failed error checking
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/1 v9] use crc32 instead of md5 for hibernation e820 integrity check
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/1 v9] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] fsverity: relax build time dependency on CRYPTO_SHA256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix unmapping invalid dma address
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [RFC v1 PATCH 1/3] drivers: soc: add support for soc_device_match returning -EPROBE_DEFER
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- RE: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- RE: [RFC v1 PATCH 1/3] drivers: soc: add support for soc_device_match returning -EPROBE_DEFER
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
- Re: [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFC v1 PATCH 1/3] drivers: soc: add support for soc_device_match returning -EPROBE_DEFER
- From: Dominique MARTINET <dominique.martinet@xxxxxxxxxxxxxxxxx>
- [RFC v1 PATCH 3/3] driver: update all the code that use soc_device_match
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- [RFC v1 PATCH 2/3] caam: add defer probe when the caam driver cannot identify SoC
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- [RFC v1 PATCH 1/3] drivers: soc: add support for soc_device_match returning -EPROBE_DEFER
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- [RFC v1 PATCH 0/3] support soc_device_match to return -EPROBE_DEFER
- From: "Alice Guo (OSS)" <alice.guo@xxxxxxxxxxx>
- RE: [PATCH] crypto: jitterentropy - change back to module_init()
- From: "Mothershead, Hailey" <hailmo@xxxxxxxxxx>
- Re: [Patch v2 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [Patch v2 3/7] crypto: qce: Add mode for rfc4309
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [Patch v2 1/7] crypto: qce: common: Add MAC failed error checking
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- [PATCH] crypto: camellia: drop duplicate "depends on CRYPTO"
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [V3 PATCH 16/16] crypto/nx: Add sysfs interface to export NX capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 14/16] crypto/nx: Register and unregister VAS interface
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 13/16] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 12/16] powerpc/pseries/vas: sysfs interface to export capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 11/16] powerpc/pseries/vas: Setup IRQ and fault handling
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 10/16] powerpc/pseries/vas: Integrate API with open/close windows
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 09/16] powerpc/pseries/vas: Implement to get all capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 08/16] powerpc/pseries/VAS: Implement allocate/modify/deallocate HCALLS
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 07/16] powerpc/vas: Define QoS credit flag to allocate window
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 06/16] powerpc/pseries/vas: Define VAS/NXGZIP HCALLs and structs
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 05/16] powerpc/vas: Define and use common vas_window struct
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 03/16] powerpc/vas: Create take/drop task reference functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 04/16] powerpc/vas: Move update_csb/dump_crb to common book3s platform
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH V3 02/16] powerpc/vas: Move VAS API to common book3s platform
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 01/16] powerpc/powernv/vas: Rename register/unregister functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V3 PATCH 00/16] Enable VAS and NX-GZIP support on powerVM
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- Re: [Patch v2 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 7/7] crypto: qce: aead: Schedule fallback algorithm
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 3/7] crypto: qce: Add mode for rfc4309
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 5/7] crypto: qce: common: Clean up qce_auth_cfg
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 4/7] crypto: qce: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 2/7] crypto: qce: common: Make result dump optional
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 1/7] crypto: qce: common: Add MAC failed error checking
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [Patch v2 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 7/8] crypto: ccp: Use the stack and common buffer for INIT command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 5/8] crypto: ccp: Use the stack for small SEV command buffers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/2] fsverity: relax build time dependency on CRYPTO_SHA256
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/1 v9] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH 3/3] crypto: s5p-sss - consistently use local 'dev' variable in probe()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: s5p-sss - remove unneeded local variable initialization
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: s5p-sss - simplify getting of_device_id match data
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: hisilicon/hpre - delete redundant log and return in advance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crc32-generic - Use SPDX-License-Identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - Move '.fpu' after '.arch'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: hisilicon/hpre - add debug log
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - enable detection of accelerators hang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] bug fix and clear coding style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: correct the use of print format
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 1/7] crypto: sun4i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium - remove unused including <linux/version.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/5] Remove redundant dev_err call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/trng - add version to adapt new algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-ce - deal with oversight in new CTR carry code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - add stop queue by hardware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ixp4xx -: use DEFINE_SPINLOCK() for spinlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: geode -: use DEFINE_SPINLOCK() for spinlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ecc: delete a useless function declaration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix unmapping invalid dma address
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ccp: ccp - add support for Green Sardine
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v2] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v8 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC Part2 PATCH 03/30] x86: add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 03/30] x86: add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: octeontx2: add support for OcteonTX2 98xx CPT block.
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- Re: [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH] chelsio/chcr: Remove useless MODULE_VERSION
- From: Vinay Kumar Yadav <vinay.yadav@xxxxxxxxxxx>
- [PATCH] crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix to return the correct return value
- From: "tiantao (H)" <tiantao6@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix to return the correct return value
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: joeyli <jlee@xxxxxxxx>
- [PATCH] crypto: ux500: cryp: Remove duplicate argument
- From: Wan Jiabing <wanjiabing@xxxxxxxx>
- [PATCH] crypto: ccp - Fix to return the correct return value
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] crypto: chelsio - remove unused function
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 3/7] crypto: qce: Add mode for rfc4309
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v7 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/7] crypto: qce: Add mode for rfc4309
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: qce: common: Add MAC failed error checking
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v7 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: sa2ul: Add support for AM64
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v2 2/3] crypto: sa2ul: Support for per channel coherency
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v2 0/3] Update dt-bindings and sa2ul driver for AM64x SoCs
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- RE: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: David Laight <David.Laight@xxxxxxxxxx>
- [V2 PATCH 16/16] crypto/nx: Add sysfs interface to export NX capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 14/16] crypto/nx: Register and unregister VAS interface
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 13/16] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 12/16] powerpc/pseries/vas: sysfs interface to export capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 11/16] powerpc/pseries/vas: Setup IRQ and fault handling
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 10/16] powerpc/pseries/vas: Integrate API with open/close windows
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 09/16] powerpc/pseries/vas: Implement to get all capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 08/16] powerpc/pseries/VAS: Implement allocate/modify/deallocate HCALLS
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 07/16] powerpc/vas: Define QoS credit flag to allocate window
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 06/16] powerpc/pseries/vas: Define VAS/NXGZIP HCALLs and structs
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 05/16] powerpc/vas: Define and use common vas_window struct
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 04/16] powerpc/vas: Move update_csb and dump_crb to platform independent
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 03/16] powerpc/vas: Create take/drop task reference functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 01/16] powerpc/powernv/vas: Rename register/unregister functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [V2 PATCH 00/16] Enable VAS and NX-GZIP support on powerVM
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [syzbot] KASAN: use-after-free Read in skcipher_walk_next
- From: syzbot <syzbot+4061a98a8ab454dde8ff@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: (subset) [PATCH v2 0/9] running kernel mode SIMD with softirqs disabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- [PATCH 1/4] crypto: hisilicon - dynamic configuration 'err_info'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon - support new error types for ZIP
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 3/4] crypto: hisilicon - add new error type for SEC
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/4] crypto: hisilicon - enable new error types for QM
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/4] crypto: hisilicon - adapt hardware error type
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 1/9] arm64: assembler: remove conditional NEON yield macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v5,4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5,2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5,3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5,1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH] crypto: fix kernel-doc notation in chacha.c and af_alg.c
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 00/16] Enable VAS and NX-GZIP support on powerVM
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 14/16] crypto/nx: Register and unregister VAS interface
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 16/16] crypto/nx: sysfs interface to export NX capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 15/16] crypto/nx: Get NX capabilities for GZIP coprocessor type
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 14/16] crypto/nx: Register and unregister VAS interface
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 13/16] crypto/nx: Rename nx-842-pseries file name to nx-common-pseries
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 12/16] powerpc/pseries/vas: sysfs interface to export capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 11/16] powerpc/pseries/vas: Setup IRQ and fault handling
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 10/16] powerpc/pseries/vas: Integrate API with open/close windows
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 09/16] powerpc/pseries/vas: Implement to get all capabilities
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 08/16] powerpc/pseries/VAS: Implement allocate/modify/deallocate HCALLS
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 07/16] powerpc/vas: Define QoS credit flag to allocate window
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 06/16] powerpc/pseries/vas: Define VAS/NXGZIP HCALLs and structs
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 05/16] powerpc/vas: Define and use common vas_window struct
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 04/16] powerpc/vas: Move update_csb/dump_crb to platform independent
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 03/16] powerpc/vas: Create take/drop task reference functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 02/16] powerpc/vas: Make VAS API powerpc platform independent
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 01/16] powerpc/powernv/vas: Rename register/unregister functions
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH 00/16] Enable VAS and NX-GZIP support on powerVM
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- [PATCH] crypto: crc32-generic - Use SPDX-License-Identifier
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH v3] crypto: hisilicon/hpre - delete redundant log and return in advance
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - fix unmapping invalid dma address
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon/hpre - add debug log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon/hpre - use the correct variable type
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon/hpre - add debug log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon/hpre - delete the rudundant space after return
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - Move '.fpu' after '.arch'
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - Move '.fpu' after '.arch'
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: arm/curve25519 - Move '.fpu' after '.arch'
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH v4 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH v4 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2 18/18] keyctl_pkey: Add pkey parameters slen and mgfhash for PSS
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH] crypto: qat - enable detection of accelerators hang
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: Re: [PATCH] backports: crypto user - make NETLINK_CRYPTO work
- From: Jianmin Wang <jianmin@xxxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2] crypto: hisilicon/hpre - delete redundant log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v3 4/5] crypto: hisilicon/sgl - fix the soft sg map to hardware sg
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 2/5] crypto: hisilicon/sgl - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 0/5] bug fix and clear coding style
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 5/5] crypto: hisilicon/sgl - fix the sg buf unmap
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: hisilicon/sgl - add a comment for block size initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: api - fix coding style
- From: "songzhiqi (A)" <songzhiqi1@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH] crypto: qat: Fix a double free in adf_create_ring
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto] chcr: Read rxchannel-id from firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hisilicon/qm - delete redundant code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto:hisilicon/sec - fixup checking the 3DES weak key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][V2] crypto: sa2ul: Fix memory leak of rxd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: sun8i-ss: Fix memory leak of pad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rockchip/rk3288_crypto_ahash - delete unneeded variable initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Use DEFINE_SPINLOCK() for spinlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon/hpre - fix a typo in hpre_crypto.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp -A value assigned to a variable is never used.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hisilicon/sec - Fix a module parameter error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: possible NULL reference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: allwinner: add missing CRYPTO_ prefix
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] crypto: hisilicon/sgl - fix the sg buf unmap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: fix incorrect kernel-doc comment syntax in file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hisilicon/hpre - delete redundant log
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cbc - fix coding style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - fix coding style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: deflate - Remove useless call "zlib_inflateEnd"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Re: [PATCH] backports: crypto user - make NETLINK_CRYPTO work
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: exynos - fix PM reference leak in exynos_trng_probe()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH -next] hwrng: exynos - fix PM reference leak in exynos_trng_probe()
- From: Ye Weihua <yeweihua4@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: Re: [PATCH] backports: crypto user - make NETLINK_CRYPTO work
- From: Jianmin Wang <jianmin@xxxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/18] Implement RSASSA-PSS signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 18/18] keyctl_pkey: Add pkey parameters slen and mgfhash for PSS
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 18/18] keyctl_pkey: Add pkey parameters slen and mgfhash for PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 14/18] crypto: Implement MGF1 Mask Generation Function for RSASSA-PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 15/18] crypto: rsa-psspad: Provide PSS signature verify operation
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 13/18] crypto: rsa-psspad: Get signature parameters from a given signature
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 12/18] crypto: rsa-psspad: Introduce shash alloc/dealloc helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 16/18] crypto: rsa-psspad: Implement signature verify callback
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 11/18] crypto: Scaffolding for RSA-PSS signature style
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 10/18] crypto: rsa: Move struct rsa_mpi_key definition to rsa.h
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 09/18] crypto: Extend akcipher API to pass signature parameters
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 07/18] crypto: rsa: Move more common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 08/18] crypto: rsa: Move rsapad_akcipher_setup_child and callback to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 05/18] crypto: rsa-pkcs1pad: Rename pkcs1pad_* structs to rsapad_*
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 06/18] crypto: rsa: Start moving RSA common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 04/18] crypto: rsa-pkcs1pad: Pull out child req processing code into helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 02/18] crypto: rsa-pkcs1pad: Rename pkcs1pad-specific functions to rsapad
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 03/18] crypto: rsa-pkcs1pad: Extract pkcs1pad_create into a generic helper
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH v2 00/18] Implement RSASSA-PSS signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH v5 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v4 2/4] crypto: support rsa-pss encoding
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- [PATCH v4 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH 0/2] crypto: correct the use of print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/sec_drv - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/2] crypto/atmel - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Is it possible to add block ciphers for MIPS OCTEON?
- From: Tony He <huangya90@xxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: support rsa-pss encoding
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH -next 7/7] crypto: omap-aes - Fix PM reference leak on omap-aes.c
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 4/7] crypto: stm32/hash - Fix PM reference leak on stm32-hash.c
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 6/7] crypto: sa2ul - Fix PM reference leak in sa_ul_probe()
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 5/7] crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 2/7] crypto: sun8i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 3/7] crypto: sun8i-ce - Fix PM reference leak in sun8i_ce_probe()
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- [PATCH -next 1/7] crypto: sun4i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
- From: Shixin Liu <liushixin2@xxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- [PATCH] crypto: cavium - remove unused including <linux/version.h>
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH -next 1/5] crypto: atmel-tdes - Remove redundant dev_err call in atmel_tdes_probe()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 5/5] crypto: ccree - Remove redundant dev_err call in init_cc_resources()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 0/5] Remove redundant dev_err call
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 2/5] crypto: img-hash - Remove redundant dev_err call in img_hash_probe()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 3/5] crypto: ux500 - Remove redundant dev_err calls
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 4/5] crypto: keembay - Remove redundant dev_err calls
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH v4 4/4] ima: add support for rsa pss verification
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v4 3/4] crypto: add rsa pss test vector
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v4 2/4] crypto: support rsa-pss encoding
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v4 1/4] x509: add support for rsa-pss
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v4 0/4] crypto: add rsa pss support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH net-next] [RESEND] wireguard: disable in FIPS mode
- From: Hangbin Liu <liuhangbin@xxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH v3 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/trng - add version to adapt new algorithm
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: add rsa pss support for x509(Internet mail)
- From: herberthbli(李弘博) <herberthbli@xxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: support rsa-pss encoding
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: add rsa pss support for x509
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: hongbo li <herbert.tencent@xxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 7/8] crypto: ccp: Use the stack and common buffer for INIT command
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 5/8] crypto: ccp: Use the stack for small SEV command buffers
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 4/4] ima: add support for rsa pss verification
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v3 3/4] crypto: add rsa pss test vector
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v3 2/4] crypto: support rsa-pss encoding
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v3 1/4] x509: add support for rsa-pss
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v3 0/4] crypto: add rsa pss support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- Re: [PATCH v2 0/2] support sign module with SM2-with-SM3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sm3 - use the more precise type u32 instead of unsigned int
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: add rsa pss support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 4/4] ima: add support for rsa pss verification
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 3/4] crypto: add rsa pss test vector
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 2/4] crypto: support rsa-pss encoding
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 1/4] x509: add support for rsa-pss
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 0/5] crypto: add rsa pss support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 8/8] KVM: SVM: Allocate SEV command structures on local stack
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: ccp: Use the stack and common buffer for INIT command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: ccp: Use the stack and common buffer for status commands
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: ccp: Use the stack for small SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: ccp: Detect and reject "invalid" addresses destined for PSP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: ccp: Free SEV device if SEV init fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/8] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: support rsa-pss encoding
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/5] x509: add support for rsa-pss
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: arm64/aes-ce - deal with oversight in new CTR carry code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/5] ima: add support for rsa pss verification
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 4/5] crypto: ecdsa ima support
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 3/5] crypto: add rsa pss test vector
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 2/5] crypto: support rsa-pss encoding
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 1/5] x509: add support for rsa-pss
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH 0/5] crypto: add rsa pss support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - add stop queue by hardware
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH -next] crypto: ixp4xx -: use DEFINE_SPINLOCK() for spinlock
- From: Huang Guobin <huangguobin4@xxxxxxxxxx>
- [PATCH -next] crypto: geode -: use DEFINE_SPINLOCK() for spinlock
- From: Huang Guobin <huangguobin4@xxxxxxxxxx>
- [PATCH v2] ecc: delete a useless function declaration
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH] ecc: delete a useless function declaration
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH] crypto: fix CRYPTO_LIB_* dependencies on CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/7] crypto: qce: Add mode for rfc4309
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 2/7] crypto: qce: common: Make result dump optional
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 6/7] crypto: qce: common: Add support for AEAD algorithms
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: qce: common: Add MAC failed error checking
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] backports: crypto user - make NETLINK_CRYPTO work inside netns
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: fix CRYPTO_LIB_* dependencies on CRYPTO
- From: Julian Braha <julianbraha@xxxxxxxxx>
- [PATCH] backports: crypto user - make NETLINK_CRYPTO work inside netns
- From: Jianmin Wang <jianmin@xxxxxxxxxxx>
- Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 0/5] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/5] crypto: ccp: Detect and reject vmalloc addresses destined for PSP
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 5/5] KVM: SVM: Allocate SEV command structures on local stack
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] crypto: ccp: Use the stack for small SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] crypto: ccp: Detect and reject vmalloc addresses destined for PSP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH crypto] chcr: Read rxchannel-id from firmware
- From: Ayush Sawal <ayush.sawal@xxxxxxxxxxx>
- [PATCH] crypto: qat: Fix a double free in adf_create_ring
- From: Lv Yunlong <lyl2019@xxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: hisilicon/hpre - delete redundant log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v2] crypto: hisilicon/qm - delete redundant code
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH][next] crypto: sun8i-ss: Fix memory leak of pad
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] ecc: delete a useless function declaration
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH] ecc: delete a useless function declaration
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - delete redundant '\n'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix a typo and delete redundant blank line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: poly1305: fix poly1305_core_setkey() declaration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fcrypt: Remove 'do while(0)' loop for single statement macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keywrap: Remove else after break statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - use the correct HiSilicon copyright
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix error path in adf_isr_resource_alloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: omap - Use of_device_get_match_data() helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete redundant log
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete redundant log
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: replace memset by memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - delete redundant code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto:hisilicon/sec - fixup checking the 3DES weak key
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH][next] crypto: sun8i-ss: Fix memory leak of pad
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: sa2ul: Fix memory lead of rxd
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][V2] crypto: sa2ul: Fix memory leak of rxd
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH v2 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: cbc - fix coding style
- From: Zhiqi Song <songzhiqi1@xxxxxxxxxx>
- [PATCH] crypto: api - fix coding style
- From: Zhiqi Song <songzhiqi1@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: rockchip/rk3288_crypto_ahash - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 18/18] keyctl_pkey: Add pkey parameter slen to pass in PSS salt length
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp -A value assigned to a variable is never used.
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon/sgl - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon/sgl - fix the sg buf unmap
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/5] bug fix and clear coding style
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon/sgl - fix the soft sg map to hardware sg
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon/sgl - add a comment for block size initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: crypto: FIPS 200 mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: deflate - Remove useless call "zlib_inflateEnd"
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH -next] crypto: ccp - Use DEFINE_SPINLOCK() for spinlock
- From: Tang Yizhou <tangyizhou@xxxxxxxxxx>
- [PATCH v9 2/3] lib: zstd: Add decompress_sources.h for decompress_unzstd
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v9 1/3] lib: zstd: Add kernel-specific API
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- crypto: FIPS 200 mode
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- [PATCH 15/18] crypto: rsa-psspad: Provide PSS signature verify operation
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 18/18] keyctl_pkey: Add pkey parameter slen to pass in PSS salt length
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 14/18] crypto: Implement MGF1 Mask Generation Function for RSASSA-PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 16/18] crypto: rsa-psspad: Implement signature verify callback
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 12/18] crypto: rsa-psspad: Introduce shash alloc/dealloc helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 13/18] crypto: rsa-psspad: Get signature salt length from a given signature
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 11/18] crypto: Scaffolding for RSA-PSS signature style
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 09/18] crypto: Extend akcipher API to pass signature parameters
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 10/18] crypto: rsa: Move struct rsa_mpi_key definition to rsa.h
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 08/18] crypto: rsa: Move rsapad_akcipher_setup_child and callback to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 06/18] crypto: rsa: Start moving RSA common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 07/18] crypto: rsa: Move more common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 04/18] crypto: rsa-pkcs1pad: Pull out child req processing code into helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 05/18] crypto: rsa-pkcs1pad: Rename pkcs1pad_* structs to rsapad_*
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 03/18] crypto: rsa-pkcs1pad: Extract pkcs1pad_create into a generic helper
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 02/18] crypto: rsa-pkcs1pad: Rename pkcs1pad-specific functions to rsapad
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 00/18] Implement RSASSA-PSS signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]