Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Read in __crypto_xor
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: Announce loop-AES-v3.7v file/swap crypto package
- From: Markus Reichelt <ml@xxxxxxxxxxxxxx>
- Re: memset() in crypto code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7v file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- C vs crypto
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- memset() in crypto code
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [syzbot] KASAN: use-after-free Read in __crypto_xor
- From: syzbot <syzbot+b187b77c8474f9648fae@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - remove unneeded packed attribute
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Connor Kuehl <ckuehl@xxxxxxxxxx>
- [PATCH 4/4] crypto: qat - free irq in case of failure
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 3/4] crypto: qat - free irqs only if allocated
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 2/4] crypto: qat - remove unmatched CPU affinity to cluster IRQ
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 1/4] crypto: qat - replace deprecated MSI API
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- [PATCH 0/4] crypto: qat - replace deprecated MSI API
- From: Wojciech Ziemba <wojciech.ziemba@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [v2,05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [syzbot] BUG: sleeping function called from invalid context in skcipher_walk_virt
- From: syzbot <syzbot+60f2f66b9e9cdeacb84d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 5.15
- From: pr-tracker-bot@xxxxxxxxxx
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fabio Estevam <festevam@xxxxxxxxx>
- HRNG in CAAM isn't working properly on IMX6 SoloX
- From: Fredrik Yhlen <fredrik.yhlen@xxxxxxxxx>
- [GIT PULL] Crypto Update for 5.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon/qm - Support the userspace task resetting
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/qm - support the userspace task resetting
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/qm - fix the uacce mmap failed
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: "yekai(A)" <yekai13@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix sscanf format signedness
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- [PATCH v3 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- crypto: hisilicon - Fix sscanf format signedness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Remove repeated verbose license text
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Add support for new CCP/PSP device ID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove rmd320 in Makefile
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 6/7] crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 5/7] crypto: arm64/aes-ccm - remove non-SIMD fallback path
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 4/7] crypto: arm64/aes-ccm - yield NEON when processing auth-only data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 2/7] crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 1/7] crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 3/7] crypto: arm64/aes-ce - stop using SIMD helper for skciphers
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: stm32 - open the configuration for COMPILE_TEST
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Vincent MAILHOL <mailhol.vincent@xxxxxxxxxx>
- Re: [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sm4 - Do not change section of ck and sbox
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: sm4 - Do not change section of ck and sbox
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/2] crypto: stm32 - open the configuration for COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- [PATCH 1/2] crypto: stm32 - Add support of COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- [PATCH 0/2] crypto: stm32 - Add support of COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: David Ahern <dsahern@xxxxxxxxx>
- [PATCH] hwrng: Add helper dependency on COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [RFCv3 14/15] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 15/15] selftests: tcp_authopt: Add tests for rollover
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 13/15] selftests: Add -t tcp_authopt option for fcnal-test.sh
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 07/15] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 09/15] selftests: tcp_authopt: Test key address binding
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 11/15] selftests: Initial tcp_authopt support for nettest
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 12/15] selftests: Initial tcp_authopt support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 10/15] selftests: tcp_authopt: Capture and verify packets
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 08/15] tcp: authopt: Add snmp counters
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 06/15] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 04/15] selftests: tcp_authopt: Initial sockopt manipulation
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 03/15] selftests: Initial tcp_authopt test module
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 05/15] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 02/15] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 01/15] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv3 00/15] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH] crypto: jitterentopy: drop kernel-doc notation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- [v3,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v3,04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] padata: Remove repeated verbose license text
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Lucas Nussbaum <lucas.nussbaum@xxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: sha512: remove imaginary and mystifying clearing of variables
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH v2] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH] padata: Remove repeated verbose license text
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH] crypto: in_irq() cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] support test GCM/CCM mode for SM4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/20] crypto: qat - cumulative fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: qat - fixes and cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] omap-crypto fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH Part2 v5 44/45] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 45/45] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 43/45] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 42/45] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 41/45] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 27/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 34/45] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 40/45] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 22/45] KVM: SVM: Add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 28/45] KVM: X86: Keep the NPT and RMP page level in sync
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 39/45] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 38/45] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 33/45] KVM: x86: Update page-fault trace to log full 64-bit error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 12/45] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 30/45] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 37/45] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 20/45] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 29/45] KVM: x86/mmu: Move 'pfn' variable to caller of direct_page_fault()
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 11/45] crypto:ccp: Define the SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 19/45] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 10/45] crypto: ccp: shutdown SEV firmware on kexec
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 36/45] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 35/45] KVM: SVM: Remove the long-lived GHCB host map
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 26/45] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 32/45] KVM: x86: Define RMP page fault error bits for #NPF
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 18/45] crypto: ccp: Provide APIs to query extended attestation report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 09/45] x86/fault: Add support to dump RMP entry on fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 25/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 08/45] x86/fault: Add support to handle the RMP fault for user address
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 24/45] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 31/45] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 07/45] x86/traps: Define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 15/45] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 06/45] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 14/45] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 13/45] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 05/45] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 04/45] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 03/45] x86/sev: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 02/45] iommu/amd: Introduce function to check SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 01/45] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Add support for new CCP/PSP device ID
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [v2, 04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RESEND] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
- From: Borislav Petkov <bp@xxxxxxxxx>
- Initialising random(4)
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Andrew Bartlett <abartlet@xxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 10/12] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 06/12] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH 2/2] crypto: md4 - Remove obsolete algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] fs/cifs: Incorporate obsolete MD4 crypto code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCHv2 00/13] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH v2 4/4] KVM: SVM: move sev_unbind_asid and DF_FLUSH logic into psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: SVM: move sev_decommission to psp driver
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 0/4] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 2/2] crypto: x86/sm4 - add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: x86/sm4 - export reusable AESNI/AVX functions
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [syzbot] INFO: task hung in hwrng_register
- From: syzbot <syzbot+fa0abe20d13faf06353d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [v2,02/12] clk: mediatek: add mt7986 clock IDs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [v2,01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv2 00/13] nvme: In-band authentication support
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: irqchip: convert Samsung Exynos IRQ combiner to dtschema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Grant Likely <grant.likely@xxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- Re: [v2,08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 4/5] ARM: dts: imx6ull: add rng
- From: Frieder Schrempf <frieder.schrempf@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: syzbot <syzbot+d2c5e6980bfc84513464@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] ARM: dts: imx6ull: add rng
- From: Frieder Schrempf <frieder.schrempf@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [v2,12/12] arm64: dts: mediatek: add mt7986b support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,11/12] arm64: dts: mediatek: add mt7986a support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,09/12] dt-bindings: serial: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,03/12] clk: mediatek: add mt7986 clock support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,02/12] clk: mediatek: add mt7986 clock IDs
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,00/12] Add basic SoC support for mediatek mt7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.14
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 5.14
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] KVM: SVM: move sev_unbind_asid and DF_FLUSH logic into psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/3] KVM: SVM: move sev_decommission to psp driver
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] crypto: initialize error variable
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: initialize error variable
- Re: Lockless /dev/random - Performance/Security/Stability improvement
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: remove rmd320 in Makefile
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: remove rmd320 in Makefile
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: Lockless /dev/random - Performance/Security/Stability improvement
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto-current tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] crypto: in_irq() cleanup
- From: Changbin Du <changbin.du@xxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon - change parameter passing of debugfs function
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon - add runtime PM ops
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon - check _PS0 and _PR0 method
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon/sec - ahash adapt to Kunpeng930 SQE
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon/sec - add fallback tfm supporting for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon/sec - add ping-pong buffer for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon/sec - support the larger packets for digest mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - supports hash algorithm for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: tcrypt - Fix missing return value check
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: tcrypt: add GCM/CCM mode test for SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto: tcrypt - Fix missing return value check
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] support test GCM/CCM mode for SM4
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v4 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 20/20] crypto: qat - store vf.compatible flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 19/20] crypto: qat - do not export adf_iov_putmsg()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 18/20] crypto: qat - flush vf workqueue at driver removal
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 17/20] crypto: qat - remove the unnecessary get_vintmsk_offset()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 16/20] crypto: qat - fix naming of PF/VF enable functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 15/20] crypto: qat - complete all the init steps before service notification
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 14/20] crypto: qat - move IO virtualization functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 13/20] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 12/20] crypto: qat - protect interrupt mask CSRs with a spinlock
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 11/20] crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 09/20] crypto: qat - remove intermediate tasklet for vf2pf
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 10/20] crypto: qat - fix reuse of completion variable
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 08/20] crypto: qat - rename compatibility version definition
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 07/20] crypto: qat - prevent spurious MSI interrupt in PF
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 06/20] crypto: qat - prevent spurious MSI interrupt in VF
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 05/20] crypto: qat - handle both source of interrupt in VF ISR
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 04/20] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 03/20] crypto: qat - enable interrupts only after ISR allocation
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 02/20] crypto: qat - remove empty sriov_configure()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 01/20] crypto: qat - use proper type for vf_mask
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 00/20] crypto: qat - cumulative fixes
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/3] crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: tcrypt: add GCM/CCM mode test for SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support test GCM/CCM mode for SM4
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v2 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: wp512: correct a non-kernel-doc comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: use kcalloc in mpi_resize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: qat - fix a typo in a comment
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 3/4] crypto: qat - disable AER if an error occurs in probe functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 2/4] crypto: qat - set DMA mask to 48 bits for Gen2
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 1/4] crypto: qat - simplify code and axe the use of a deprecated API
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 0/4] crypto: qat - fixes and cleanups
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 13/14] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/14] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/14] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 08/14] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: irqchip: convert Samsung Exynos IRQ combiner to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v3 0/8] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] crypto: omap - Fix inconsistent locking of device lists
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- [PATCH 1/2] crypto: omap - Avoid redundant copy when using truncated sg list
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- [PATCH 0/2] omap-crypto fixes
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 07/13] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 12/13] nvmet-auth: expire authentication sessions
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 11/13] nvmet-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 03/13] crypto/ffdhe: Finite Field DH Ephemeral Parameters
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 10/13] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 06/13] nvme-fabrics: decode 'authentication required' connect error
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 08/13] nvme-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 05/13] nvme: add definitions for NVMe In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 09/13] nvmet: Parse fabrics commands on all queues
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCHv2 00/13] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 02/13] crypto: add crypto_has_kpp()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 01/13] crypto: add crypto_has_shash()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 8/9] selftests: Initial TCP-AO support for nettest
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 6/9] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 7/9] tcp: authopt: Add snmp counters
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 5/9] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 3/9] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 4/9] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 2/9] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 0/9] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: wp512: correct a non-kernel-doc comment
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] asymmetric_keys: verify_pefile: fix kernel-doc notation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon - add runtime PM ops
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon - change parameter passing of debugfs function
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon - check _PS0 and _PR0 method
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon - enable hpre device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon - enable sec device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon - enable zip device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/sha256 - add sha256_value function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Byungchul Park <byungchul.park@xxxxxxx>
- [PATCH] crypto: lib/sha256 - add sha256_value function
- From: "Chen Li" <chenli@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon/sec - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Byungchul Park <byungchul.park@xxxxxxx>
- Re: [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 16/16] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 15/16] padata: validate cpumask without removed CPU during offline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 02/12] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] lib/mpi: use kcalloc in mpi_resize
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Ido Schimmel <idosch@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- [PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
- From: Jason Wang <wangborong@xxxxxxxxxx>
- [PATCH 4.19 2/2] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 4.19 1/2] padata: validate cpumask without removed CPU during offline
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v2 6/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [crypto] ed610fb786: will-it-scale.per_thread_ops 4.6% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v4 1/2] firmware: smccc: Register smccc_trng platform device
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon/sec - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] crypto: add missing kernel_fpu_end() call
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
- From: David Gow <davidgow@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]