Linux Crypto
[Prev Page][Next Page]
- [PATCH 02/12] crypto: add crypto_has_kpp()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCHv4 00/12] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH] crypto: api - Export crypto_boot_test_finished
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v4 0/8] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH v4 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH v4 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 25/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2] dt-bindings: rng: convert OMAP and Inside-Secure HWRNG to yaml schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Leon Romanovsky <leonro@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Leon Romanovsky <leonro@xxxxxxxxxx>
- Re: [PATCH 2/4] dt-bindings: nintendo-aes: Document the Wii and Wii U AES support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH Part2 v5 25/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH Part2 v5 05/45] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 04/45] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 04/45] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Leon Romanovsky <leonro@xxxxxxxxxx>
- RE: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re;
- From: "Barr. Kofa " <davidmanknell@xxxxxxxxx>
- RE: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [v3,8/9] arm64: dts: mediatek: add mt7986a support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [v5,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: ccree - avoid out-of-range warnings from clang
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] crypto: api - Export crypto_boot_test_finished
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH] crypto: hisilicon/qm - modify the uacce mode check
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [v5,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 17/19] selftests: Add -t tcp_authopt option for fcnal-test.sh
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 08/19] tcp: authopt: Disable via sysctl by default
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 08/19] tcp: authopt: Disable via sysctl by default
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH 17/19] selftests: Add -t tcp_authopt option for fcnal-test.sh
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH Part2 v5 05/45] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [v4,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- [v4,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,7/9] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,9/9] arm64: dts: mediatek: add mt7986b support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,8/9] arm64: dts: mediatek: add mt7986a support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH Part2 v5 04/45] x86/sev: Add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 5/6] crypto: hisilicon/sec - add fallback tfm supporting for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/6] crypto: hisilicon - supports hash algorithm for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 6/6] crypto: hisilicon/sec - add sm3/md5 generic selection for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: hisilicon/sec - ahash adapt to Kunpeng930 SQE
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: hisilicon/sec - support the larger packets for digest mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: hisilicon/sec - add ping-pong buffer for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH Part2 v5 03/45] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v3 3/6] hisi_acc_qm: Move PCI device IDs to common header
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa: drop unneeded MODULE_ALIAS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - power up 4xxx device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: disable pkc for non-E SoCs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto/sm4: Fix frame pointer stack corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Mackall as his identity is obsolete
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 26/45] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: disable pkc for non-E SoCs
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: RFC 4301,3602 and 4868 support in Linux kernel 4.9.180
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH 1/4] hwrng: virtio - add an internal buffer
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- RFC 4301,3602 and 4868 support in Linux kernel 4.9.180
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH 1/4] hwrng: virtio - add an internal buffer
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] crypto: arm64/gcm-ce - unroll factors to 4-way interleave of aes and ghash
- From: XiaokangQian <xiaokang.qian@xxxxxxx>
- Re: [PATCH 1/4] hwrng: virtio - add an internal buffer
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
- Re: [PATCH 1/4] hwrng: virtio - add an internal buffer
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: disable pkc for non-E SoCs
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH 0/4] hwrng: virtio - add an internal buffer
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- [PATCH 4/4] hwrng: virtio - always add a pending request
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 3/4] hwrng: virtio - don't waste entropy
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 2/4] hwrng: virtio - don't wait on cleanup
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 1/4] hwrng: virtio - add an internal buffer
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 0/4] hwrng: virtio - add an internal buffer
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: disable pkc for non-E SoCs
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 3/6] hisi_acc_qm: Move PCI device IDs to common header
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] dt-bindings: rng: convert OMAP and Inside-Secure HWRNG to yaml schema
- From: Jayesh Choudhary <j-choudhary@xxxxxx>
- Re: [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] x86/crypto/sm4: Fix frame pointer stack corruption
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: convert OMAP and Inside-Secure HWRNG to yaml schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: nintendo-aes - add a new AES driver
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: nintendo-aes - add a new AES driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/4] powerpc: wii_defconfig: Enable AES by default
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- [PATCH 2/4] dt-bindings: nintendo-aes: Document the Wii and Wii U AES support
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- [PATCH 0/4] crypto: nintendo-aes - add a new AES driver
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- [PATCH 1/4] crypto: nintendo-aes - add a new AES driver
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- [PATCH 3/4] powerpc: wii.dts: Expose the AES engine on this platform
- From: Emmanuel Gil Peyrot <linkmauve@xxxxxxxxxxxx>
- Re: [PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] X.509: Support parsing certificate using SM2 algorithm
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 04/19] selftests: tcp_authopt: Initial sockopt manipulation
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 02/19] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 14/19] selftests: tcp_authopt: Add packet-level tests
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 19/19] selftests: tcp_authopt: Add tests for rollover
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 16/19] selftests: Initial tcp_authopt support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 11/19] tcp: authopt: Add support for signing skb-less replies
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 09/19] selftests: tcp_authopt: Test key address binding
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 10/19] tcp: ipv6: Add AO signing for tcp_v6_send_response
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 15/19] selftests: Initial tcp_authopt support for nettest
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 13/19] selftests: tcp_authopt: Add scapy-based packet signing code
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 03/19] selftests: Initial tcp_authopt test module
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 18/19] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 08/19] tcp: authopt: Disable via sysctl by default
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 07/19] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 17/19] selftests: Add -t tcp_authopt option for fcnal-test.sh
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 05/19] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 12/19] tcp: ipv4: Add AO signing for skb-less replies
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 06/19] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 01/19] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH 00/19] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Claudius Heine <ch@xxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] hwrng: meson - Improve error handling for core clock
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [linux-next:master 3857/7963] arch/x86/crypto/sm4-aesni-avx-asm_64.o: warning: objtool: sm4_aesni_avx_crypt8()+0x8: sibling call from callable instruction with modified stack frame
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon: Fix spelling mistake "COMSUMED" -> "CONSUMED"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc: fix CRYPTO_DEFAULT_RNG dependency
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Claudius Heine <ch@xxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] MAINTAINERS: Remove Matt Mackall as his identity is obsolete
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: ecc: fix CRYPTO_DEFAULT_RNG dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: meson - Improve error handling for core clock
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Remove Matt Mackall as his identity is obsolete
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2] hwrng: meson - Improve error handling for core clock
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: meson - Improve error handling for core clock
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [PATCHv3 00/12] nvme: In-band authentication support
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- [PATCH v4 1/2] pkcs7: parser support SM2 and SM3 algorithms combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] pkcs7: support EC-RDSA/streebog in SignerInfo
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] pkcs7: support SM2/SM3 and EC-RDSA/streebog algorithms
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] pkcs7: support EC-RDSA/streebog in SignerInfo
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] pkcs7: make parser enable SM2 and SM3 algorithms combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Support parsing certificate using SM2 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v42 01/13] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v42 01/13] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v42 09/13] crypto: move Jitter RNG header include dir
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 10/13] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 13/13] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 11/13] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 12/13] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 03/13] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 08/13] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 06/13] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 07/13] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 04/13] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 01/13] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 00/13] /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 02/13] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v42 05/13] LRNG - add common generic hash support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 05/12] nvme: add definitions for NVMe In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH] crypto: x86/aes-ni - check walk.nbytes instead of err
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - Fix unused value warning in drbg_healthcheck_sanity()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: img-hash: remove need for error return variable ret
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: ixp4xx: Make use of the helper function devm_platform_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove unneeded packed attribute
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: qat - replace deprecated MSI API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon/qm - Support the userspace task resetting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Add helper dependency on COMPILE_TEST
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sm4 - Do not change section of ck and sbox
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC] random: add new pseudorandom number generator
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: jitterentopy: drop kernel-doc notation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [v2 PATCH] crypto: api - Fix built-in testing dependency failures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v6 03/13] KEYS: CA link restriction
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH] dt-bindings: rng: convert OMAP and Inside-Secure HWRNG to yaml schema
- From: Jayesh Choudhary <j-choudhary@xxxxxx>
- Re: [PATCH Part2 v5 01/45] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 02/45] iommu/amd: Introduce function to check SEV-SNP support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] crypto: marvell/cesa: drop unneeded MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 06/12] nvme-fabrics: decode 'authentication required' connect error
- From: Chaitanya Kulkarni <chaitanyak@xxxxxxxxxx>
- Re: [PATCH 05/12] nvme: add definitions for NVMe In-Band authentication
- From: Chaitanya Kulkarni <chaitanyak@xxxxxxxxxx>
- Re: [PATCH 02/12] crypto: add crypto_has_kpp()
- From: Chaitanya Kulkarni <chaitanyak@xxxxxxxxxx>
- Re: [PATCH 01/12] crypto: add crypto_has_shash()
- From: Chaitanya Kulkarni <chaitanyak@xxxxxxxxxx>
- Re: [PATCH Part2 v5 01/45] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: qat - power up 4xxx device
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC][PATCH] crypto: caam - Add missing MODULE_ALIAS
- From: Marek Vasut <marex@xxxxxxx>
- Re: [RESEND,v3,4/9] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] crypto: caam: disable pkc for non-E SoCs
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v3 4/6] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 4/6] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: hisilicon/qm: Move the QM header to include/linux
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 6/6] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 5/6] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 4/6] hisi-acc-vfio-pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 3/6] hisi_acc_qm: Move PCI device IDs to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 2/6] crypto: hisilicon/qm: Move few definitions to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 1/6] crypto: hisilicon/qm: Move the QM header to include/linux
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v3 0/6] vfio/hisilicon: add acc live migration driver
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH] hwrng: meson - Improve error handling for core clock
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [PATCH v6 09/13] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 11/13] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 10/13] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 08/13] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 13/13] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 04/13] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 05/13] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 06/13] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 02/13] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 03/13] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 07/13] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 01/13] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [v3,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [RESEND,v2,7/9] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [RESEND,v2,8/9] arm64: dts: mediatek: add mt7986a support
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- [PATCH] hwrng: meson - Improve error handling for core clock
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [RESEND,v2,9/9] arm64: dts: mediatek: add mt7986b support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [RESEND,v2,8/9] arm64: dts: mediatek: add mt7986a support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [RESEND,v2,7/9] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v4,6/9] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,5/9] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [RESEND,v3,4/9] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [RESEND,v2,3/9] clk: mediatek: add mt7986 clock support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,2/9] clk: mediatek: add mt7986 clock IDs
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,0/9] Add basic SoC support for mediatek mt7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,1/9] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH] crypto: api - Fix built-in testing dependency failures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] crypto: api - Fix built-in testing dependency failures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/12] nvmet: Parse fabrics commands on all queues
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/12] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 05/12] nvme: add definitions for NVMe In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 06/12] nvme-fabrics: decode 'authentication required' connect error
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 02/12] crypto: add crypto_has_kpp()
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: add crypto_has_shash()
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCHv3 00/12] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCHv3 00/12] nvme: In-band authentication support
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- [PATCH] crypto: api - Fix built-in testing dependency failures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: In _extract_crng() mix in 64 bits if possible
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH Part2 v5 18/45] crypto: ccp: Provide APIs to query extended attestation report
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: x86/aes-ni - check walk.nbytes instead of err
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] random: In _extract_crng() mix in 64 bits if possible
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] crypto: drbg - Fix unused value warning in drbg_healthcheck_sanity()
- From: Tim Gardner <tim.gardner@xxxxxxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH] crypto: img-hash: remove need for error return variable ret
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH 10/12] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 07/12] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 12/12] nvmet-auth: expire authentication sessions
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 11/12] nvmet-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 01/12] crypto: add crypto_has_shash()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 05/12] nvme: add definitions for NVMe In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 08/12] nvme-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 06/12] nvme-fabrics: decode 'authentication required' connect error
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 03/12] crypto/ffdhe: Finite Field DH Ephemeral Parameters
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 09/12] nvmet: Parse fabrics commands on all queues
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 04/12] lib/base64: RFC4648-compliant base64 encoding
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 02/12] crypto: add crypto_has_kpp()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCHv3 00/12] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v5 18/45] crypto: ccp: Provide APIs to query extended attestation report
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KEYS: integrity: change link restriction to trust the machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/12] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 02/12] integrity: Do not allow machine keyring updates following init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 01/35] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 01/48] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.14 02/59] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 02/74] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 004/109] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 007/176] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 014/219] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 020/252] crypto: mxs-dcp - Use sg_mapping_iter to copy data
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] In _extract-crng mix in 64 bits if possible
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] In _extract-crng mix in 64 bits if possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] In _extract-crng mix in 64 bits if possible
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH] random.c: Update RFC reference
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [bug report] crypto: aesni - xts_crypt() return if walk.nbytes is 0
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v5 12/12] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 09/12] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 02/12] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 06/12] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 11/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 08/12] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 10/12] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 05/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] hw_random: ixp4xx: Make use of the helper function devm_platform_ioremap_resource()
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- [PATCH AUTOSEL 4.4 8/9] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 7/9] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 6/9] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 3/9] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 2/9] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 13/14] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 12/14] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 10/14] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 11/14] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 09/14] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 04/14] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 02/14] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 15/17] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 16/17] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 14/17] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 13/17] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 12/17] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 04/17] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 21/23] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 02/17] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 20/23] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 19/23] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 18/23] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 17/23] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 06/23] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 03/23] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 26/30] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 25/30] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 23/30] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 24/30] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 22/30] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 06/30] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 03/30] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 32/39] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 31/39] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 30/39] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 29/39] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 28/39] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 27/39] crypto: omap - Fix inconsistent locking of device lists
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 32/46] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 33/46] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 07/39] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 04/39] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 36/46] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 35/46] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 37/46] crypto: tcrypt - Fix missing return value check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 29/46] crypto: omap - Fix inconsistent locking of device lists
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 30/46] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 31/46] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 34/46] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 07/46] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 04/46] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 32/47] crypto: qat - fix reuse of completion variable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 37/47] crypto: tcrypt - Fix missing return value check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 31/47] crypto: qat - handle both source of interrupt in VF ISR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 30/47] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 29/47] crypto: omap - Fix inconsistent locking of device lists
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 33/47] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 34/47] crypto: qat - do not export adf_iov_putmsg()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 35/47] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 36/47] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 07/47] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.14 04/47] crypto: mxs-dcp - Check for DMA mapping errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Read in __crypto_xor
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: Announce loop-AES-v3.7v file/swap crypto package
- From: Markus Reichelt <ml@xxxxxxxxxxxxxx>
- Re: memset() in crypto code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7v file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- C vs crypto
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- memset() in crypto code
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [syzbot] KASAN: use-after-free Read in __crypto_xor
- From: syzbot <syzbot+b187b77c8474f9648fae@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - remove unneeded packed attribute
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Connor Kuehl <ckuehl@xxxxxxxxxx>
- [PATCH 4/4] crypto: qat - free irq in case of failure
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 3/4] crypto: qat - free irqs only if allocated
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 2/4] crypto: qat - remove unmatched CPU affinity to cluster IRQ
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 1/4] crypto: qat - replace deprecated MSI API
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 0/4] crypto: qat - replace deprecated MSI API
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [v2,05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [syzbot] BUG: sleeping function called from invalid context in skcipher_walk_virt
- From: syzbot <syzbot+60f2f66b9e9cdeacb84d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 5.15
- From: pr-tracker-bot@xxxxxxxxxx
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fabio Estevam <festevam@xxxxxxxxx>
- HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- [GIT PULL] Crypto Update for 5.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon/qm - Support the userspace task resetting
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/qm - support the userspace task resetting
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/qm - fix the uacce mmap failed
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: "yekai(A)" <yekai13@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix sscanf format signedness
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- [PATCH v3 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- crypto: hisilicon - Fix sscanf format signedness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Remove repeated verbose license text
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Add support for new CCP/PSP device ID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove rmd320 in Makefile
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 6/7] crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 5/7] crypto: arm64/aes-ccm - remove non-SIMD fallback path
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 4/7] crypto: arm64/aes-ccm - yield NEON when processing auth-only data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 2/7] crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 1/7] crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 3/7] crypto: arm64/aes-ce - stop using SIMD helper for skciphers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: stm32 - open the configuration for COMPILE_TEST
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sm4 - Do not change section of ck and sbox
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: sm4 - Do not change section of ck and sbox
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/2] crypto: stm32 - open the configuration for COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- [PATCH 1/2] crypto: stm32 - Add support of COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- [PATCH 0/2] crypto: stm32 - Add support of COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: David Ahern <dsahern@xxxxxxxxx>
- [PATCH] hwrng: Add helper dependency on COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [RFCv3 14/15] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 15/15] selftests: tcp_authopt: Add tests for rollover
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 13/15] selftests: Add -t tcp_authopt option for fcnal-test.sh
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 11/15] selftests: Initial tcp_authopt support for nettest
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 12/15] selftests: Initial tcp_authopt support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 10/15] selftests: tcp_authopt: Capture and verify packets
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 08/15] tcp: authopt: Add snmp counters
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 06/15] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 04/15] selftests: tcp_authopt: Initial sockopt manipulation
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 03/15] selftests: Initial tcp_authopt test module
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 02/15] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 00/15] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH] crypto: jitterentopy: drop kernel-doc notation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- [v3,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] padata: Remove repeated verbose license text
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Lucas Nussbaum <lucas.nussbaum@xxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH v2] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH] padata: Remove repeated verbose license text
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH] crypto: in_irq() cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] support test GCM/CCM mode for SM4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/20] crypto: qat - cumulative fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: qat - fixes and cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] omap-crypto fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH Part2 v5 44/45] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 45/45] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 43/45] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 42/45] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 41/45] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 27/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 34/45] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 40/45] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 22/45] KVM: SVM: Add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 28/45] KVM: X86: Keep the NPT and RMP page level in sync
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 39/45] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 38/45] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 33/45] KVM: x86: Update page-fault trace to log full 64-bit error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 12/45] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 30/45] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 37/45] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 20/45] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 29/45] KVM: x86/mmu: Move 'pfn' variable to caller of direct_page_fault()
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 11/45] crypto:ccp: Define the SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 19/45] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 10/45] crypto: ccp: shutdown SEV firmware on kexec
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 36/45] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 35/45] KVM: SVM: Remove the long-lived GHCB host map
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 26/45] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 32/45] KVM: x86: Define RMP page fault error bits for #NPF
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 18/45] crypto: ccp: Provide APIs to query extended attestation report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 09/45] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 25/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 24/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 31/45] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 07/45] x86/traps: Define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 15/45] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 06/45] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 14/45] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 13/45] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 05/45] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 04/45] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 03/45] x86/sev: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 02/45] iommu/amd: Introduce function to check SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 01/45] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Add support for new CCP/PSP device ID
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [v2, 04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RESEND] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
- From: Borislav Petkov <bp@xxxxxxxxx>
- Initialising random(4)
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 10/12] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]