Linux Crypto
[Prev Page][Next Page]
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 06/12] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Jeremy Allison <jra@xxxxxxxxx>
- Re: [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove MD4 generic shash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH 2/2] crypto: md4 - Remove obsolete algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] fs/cifs: Incorporate obsolete MD4 crypto code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] crypto: remove MD4 generic shash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- PING: [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- [PATCH 2/5] treewide: Replace open-coded flex arrays in unions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCHv2 00/13] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH v2 4/4] KVM: SVM: move sev_unbind_asid and DF_FLUSH logic into psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: SVM: move sev_decommission to psp driver
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: SVM: fix missing sev_decommission in sev_receive_start
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 0/4] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 2/2] crypto: x86/sm4 - add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: x86/sm4 - export reusable AESNI/AVX functions
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] add AES-NI/AVX2/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [syzbot] INFO: task hung in hwrng_register
- From: syzbot <syzbot+fa0abe20d13faf06353d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [v2,02/12] clk: mediatek: add mt7986 clock IDs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [v2,01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCHv2 00/13] nvme: In-band authentication support
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: irqchip: convert Samsung Exynos IRQ combiner to dtschema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Grant Likely <grant.likely@xxxxxxx>
- Re: [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- Re: [v2,08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 4/5] ARM: dts: imx6ull: add rng
- From: Frieder Schrempf <frieder.schrempf@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- [syzbot] KASAN: use-after-free Write in null_skcipher_crypt
- From: syzbot <syzbot+d2c5e6980bfc84513464@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] ARM: dts: imx6ull: add rng
- From: Frieder Schrempf <frieder.schrempf@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Lukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 0/3] clean up interface between KVM and psp
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [v2,12/12] arm64: dts: mediatek: add mt7986b support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,11/12] arm64: dts: mediatek: add mt7986a support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,09/12] dt-bindings: serial: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,04/12] pinctrl: mediatek: moore: check if pin_desc is valid before use
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,03/12] clk: mediatek: add mt7986 clock support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,02/12] clk: mediatek: add mt7986 clock IDs
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [v2,00/12] Add basic SoC support for mediatek mt7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.14
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 5.14
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] KVM: SVM: move sev_unbind_asid and DF_FLUSH logic into psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: move sev_bind_asid to psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/3] KVM: SVM: move sev_decommission to psp driver
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/3] clean up interface between KVM and psp
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] crypto: initialize error variable
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: initialize error variable
- Re: Lockless /dev/random - Performance/Security/Stability improvement
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: remove rmd320 in Makefile
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: remove rmd320 in Makefile
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: Lockless /dev/random - Performance/Security/Stability improvement
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto-current tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - select SHA512
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] crypto: in_irq() cleanup
- From: Changbin Du <changbin.du@xxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon - change parameter passing of debugfs function
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon - add runtime PM ops
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon - check _PS0 and _PR0 method
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon/sec - ahash adapt to Kunpeng930 SQE
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon/sec - add fallback tfm supporting for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon/sec - add ping-pong buffer for ahash
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon/sec - add ahash alg features for Kunpeng920
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon/sec - support the larger packets for digest mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - supports hash algorithm for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: tcrypt - Fix missing return value check
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: tcrypt: add GCM/CCM mode test for SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto: tcrypt - Fix missing return value check
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] support test GCM/CCM mode for SM4
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v4 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: Building cifs.ko without any support for insecure crypto?
- From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
- Building cifs.ko without any support for insecure crypto?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 20/20] crypto: qat - store vf.compatible flag
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 19/20] crypto: qat - do not export adf_iov_putmsg()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 18/20] crypto: qat - flush vf workqueue at driver removal
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 17/20] crypto: qat - remove the unnecessary get_vintmsk_offset()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 16/20] crypto: qat - fix naming of PF/VF enable functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 15/20] crypto: qat - complete all the init steps before service notification
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 14/20] crypto: qat - move IO virtualization functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 13/20] crypto: qat - fix naming for init/shutdown VF to PF notifications
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 12/20] crypto: qat - protect interrupt mask CSRs with a spinlock
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 11/20] crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 09/20] crypto: qat - remove intermediate tasklet for vf2pf
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 10/20] crypto: qat - fix reuse of completion variable
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 08/20] crypto: qat - rename compatibility version definition
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 07/20] crypto: qat - prevent spurious MSI interrupt in PF
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 06/20] crypto: qat - prevent spurious MSI interrupt in VF
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 05/20] crypto: qat - handle both source of interrupt in VF ISR
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 04/20] crypto: qat - do not ignore errors from enable_vf2pf_comms()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 03/20] crypto: qat - enable interrupts only after ISR allocation
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 02/20] crypto: qat - remove empty sriov_configure()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 01/20] crypto: qat - use proper type for vf_mask
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 00/20] crypto: qat - cumulative fixes
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/3] crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: tcrypt - Fix the wrong position of return value test statement
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: tcrypt: add GCM/CCM mode test for SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support test GCM/CCM mode for SM4
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v2 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: wp512: correct a non-kernel-doc comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: use kcalloc in mpi_resize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: qat - fix a typo in a comment
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 3/4] crypto: qat - disable AER if an error occurs in probe functions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 2/4] crypto: qat - set DMA mask to 48 bits for Gen2
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 1/4] crypto: qat - simplify code and axe the use of a deprecated API
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 0/4] crypto: qat - fixes and cleanups
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 13/14] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/14] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/14] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 08/14] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 2/2] dt-bindings: rng: convert Samsung Exynos TRNG to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: irqchip: convert Samsung Exynos IRQ combiner to dtschema
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [PATCH v3 0/8] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 4/8] PCI: replace pci_dev::driver usage that gets the driver name
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 6/8] crypto: qat - simplify adf_enable_aer()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] crypto: omap - Fix inconsistent locking of device lists
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- [PATCH 1/2] crypto: omap - Avoid redundant copy when using truncated sg list
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- [PATCH 0/2] omap-crypto fixes
- From: Ben Hutchings <ben.hutchings@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 07/13] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 13/13] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 12/13] nvmet-auth: expire authentication sessions
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 11/13] nvmet-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 03/13] crypto/ffdhe: Finite Field DH Ephemeral Parameters
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 10/13] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 06/13] nvme-fabrics: decode 'authentication required' connect error
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 08/13] nvme-auth: Diffie-Hellman key exchange support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 04/13] lib/base64: RFC4648-compliant base64 encoding
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 05/13] nvme: add definitions for NVMe In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 09/13] nvmet: Parse fabrics commands on all queues
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCHv2 00/13] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 02/13] crypto: add crypto_has_kpp()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 01/13] crypto: add crypto_has_shash()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: public_key: fix overflow during implicit conversion
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFCv2 9/9] selftests: Initial TCP-AO support for fcnal-test
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 8/9] selftests: Initial TCP-AO support for nettest
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 6/9] tcp: authopt: Add key selection controls
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 7/9] tcp: authopt: Add snmp counters
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 5/9] tcp: authopt: Hook into tcp core
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 3/9] tcp: authopt: Add crypto initialization
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 4/9] tcp: authopt: Compute packet signatures
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 2/9] docs: Add user documentation for tcp_authopt
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 1/9] tcp: authopt: Initial support and key management
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- [RFCv2 0/9] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH] crypto: xts_crypt() return if walk.nbytes is 0
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: wp512: correct a non-kernel-doc comment
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] asymmetric_keys: verify_pefile: fix kernel-doc notation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 6/6 v2] wireguard: main: rename 'mod_init' & 'mod_exit' functions to be module-specific
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon - support runtime PM for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon - add runtime PM ops
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon - change parameter passing of debugfs function
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon - check _PS0 and _PR0 method
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - support runtime PM for accelerator devices
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon - enable hpre device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon - enable sec device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon - enable zip device clock gating
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon - enable clock gating for accelerator device
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/sha256 - add sha256_value function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Byungchul Park <byungchul.park@xxxxxxx>
- [PATCH] crypto: lib/sha256 - add sha256_value function
- From: "Chen Li" <chenli@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/sec - fix the abnormal exiting process
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/sec - modify the hardware endian configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon/sec - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [REPORT] Request for reviewing crypto code wrt wait_for_completion()
- From: Byungchul Park <byungchul.park@xxxxxxx>
- Re: [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: add missing kernel_fpu_end() call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 16/16] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 15/16] padata: validate cpumask without removed CPU during offline
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 02/12] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] lib/mpi: use kcalloc in mpi_resize
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- Re: [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Ido Schimmel <idosch@xxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH 27/38] padata: Replace deprecated CPU-hotplug functions.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 12/38] crypto: virtio: Replace deprecated CPU-hotplug functions.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 00/38] Replace deprecated CPU-hotplug
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- [PATCH] crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
- From: Jason Wang <wangborong@xxxxxxxxxx>
- [PATCH 4.19 2/2] padata: add separate cpuhp node for CPUHP_PADATA_DEAD
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 4.19 1/2] padata: validate cpumask without removed CPU during offline
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 4.19 0/2] fix divide zero error in padata_do_parallel()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v2 6/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 5/6] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 0/6] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] PCI: Provide wrapper to access a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [crypto] ed610fb786: will-it-scale.per_thread_ops 4.6% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v4 1/2] firmware: smccc: Register smccc_trng platform device
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v4 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon/sec - use the correct print format
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon/sec - fix the CTR mode BD configuration
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon - some misc bugfix for SEC engine
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon/sec - delete the print of fallback tfm application failure
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/5] crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] crypto: add missing kernel_fpu_end() call
- From: Shreyansh Chouhan <chouhan.shreyansh630@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
- From: David Gow <davidgow@xxxxxxxxxx>
- Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND] crypto: atmel-aes: use swap()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - Use kfree_sensitive
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 02/12] clk: mediatek: add mt7986 clock IDs
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v1 4/5] PCI: Adapt all code locations to not use struct pci_dev::driver directly
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 01/17] dt-bindings: qcom-bam: Convert binding to YAML
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ccp: shutdown SEV firmware on kexec
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH v1] fscrypt: support encrypted and trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: omap-sham - drop suspend and resume functions
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 4/6] crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 6/6] crypto: omap-sham - drop pm_runtime_irqsafe() usage
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 2/6] crypto: omap-sham - initialize req only after omap_sham_hw_init()
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 3/6] crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 1/6] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Francesco Ruggeri <fruggeri@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v3 2/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v3 1/2] firmware: smccc: Register smccc_trng platform device
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH v3 0/2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2] crypto: ccm - avoid negative wrapping of integers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RFC v2 06/12] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 08/12] integrity: Suppress error message for keys added to the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 09/12] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 02/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 05/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_system_trusted_or_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 12/12] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 11/12] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 07/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 03/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC v2 04/12] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2] crypto: ccm - avoid negative wrapping of integers
- From: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: avoid negative wrapping of integers
- From: Jordy Zomer <jordy@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [PATCH] crypto: sun8i-ce: fix multiple memory leaks in sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [PATCH v4] crypto: sun8i-ss: fix multiple memory leaks in sun8i_ss_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [PATCH v3] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Chen-Yu Tsai <wenst@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [PATCH 12/12] arm64: dts: mediatek: add mt7986b support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 11/12] arm64: dts: mediatek: add mt7986a support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 10/12] dt-bindings: watchdog: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 09/12] dt-bindings: serial: Add compatible for Mediatek MT7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 08/12] dt-bindings: rng: mediatek: add mt7986 to mtk rng binding
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 07/12] dt-bindings: arm64: dts: mediatek: Add mt7986 series
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 06/12] pinctrl: mediatek: add support for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 05/12] dt-bindings: pinctrl: update bindings for MT7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 04/12] pinctrl: mediatek: moore: use pin number in mtk_pin_desc instead of array index
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 03/12] clk: mediatek: add mt7986 clock support
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 02/12] clk: mediatek: add mt7986 clock IDs
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 01/12] dt-bindings: clock: mediatek: document clk bindings for mediatek mt7986 SoC
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- [PATCH 00/12] Add basic SoC support for mediatek mt7986
- From: Sam Shih <sam.shih@xxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: sun8i-ce: fix memory leak and return value of sun8i_ce_hash_run
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
- From: Daniel Latypov <dlatypov@xxxxxxxxxx>
- Re: Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Extending CRYPTO_ALG_OPTIONAL_KEY for cipher algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [RESEND] gpu: ipu-v3: use swap()
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v1 1/2] crypto: tcrypt: minimal conversion to run under KUnit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND] crypto: atmel-aes: use swap()
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [RESEND] crypto: atmel-aes: use swap()
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- [RESEND] crypto: atmel-aes: use swap()
- From: Salah Triki <salah.triki@xxxxxxxxx>
- [RESEND] gpu: ipu-v3: use swap()
- From: Salah Triki <salah.triki@xxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 1/4] KEYS: trusted: allow users to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH] crypto: ecc: handle unaligned input buffer in ecc_swap_digits
- From: Mian Yousaf Kaukab <ykaukab@xxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH 05/11] nvme: add definitions for NVMe In-Band authentication
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Vladislav Bolkhovitin <vst@xxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v2] hwrng: Add Arm SMCCC TRNG based driver
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 07/11] nvme-auth: augmented challenge support
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH] crypto: sun8i-ss - Use kfree_sensitive
- From: Jason Wang <wangborong@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 8/9] crypto: atmel-aes: Add fallback to XTS software implementation
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/9] crypto: atmel-{aes, tdes}: Fix corner cases - crypto self tests
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 4/9] crypto: atmel-aes: Add XTS input length constraint
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/9] crypto: atmel-tdes: Handle error messages
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 5/9] crypto: atmel-aes: Add NIST 800-38A's zero length cryptlen constraint
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 7/9] crypto: atmel-{aes, tdes}: Set OFB's blocksize to 1
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 9/9] crypto: atmel-aes: Allocate aes dev at tfm init time
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 6/9] crypto: atmel-tdes: Add FIPS81's zero length cryptlen constraint
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/9] crypto: atmel-aes: Add blocksize constraint for ECB and CBC modes
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/9] crypto: atmel-tdes: Clarify how tdes dev gets allocated to the tfm
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH v3 1/4] crypto: sm4 - create SM4 library based on sm4 generic code
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Introduce x86 assembler accelerated implementation for SM4 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] crypto: tcrypt - add the asynchronous speed test for SM4
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 0/2] crypto: mxs_dcp: Fix an Oops on i.MX6ULL
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] replace if with min
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] replace if with min
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC] tcp: Initial support for RFC5925 auth option
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxxxx>
- Re: [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC] tcp: Initial support for RFC5925 auth option
- From: Leonard Crestez <cdleonard@xxxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 00/11] nvme: In-band authentication support
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 08/11] nvmet: Parse fabrics commands on all queues
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 07/11] nvme-auth: augmented challenge support
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-ni - add missing error checks in XTS code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 4/6 v2] MOST: cdev: rename 'mod_init' & 'mod_exit' functions to be module-specific
- From: <Christian.Gromm@xxxxxxxxxxxxx>
- Re: [PATCH 5/6 v2] net: hdlc: rename 'mod_init' & 'mod_exit' functions to be module-specific
- From: Krzysztof Hałasa <khalasa@xxxxxxx>
- Re: linux-next: Fixes tag needs some work in the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Fixes tag needs some work in the crypto tree
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] nvme-auth: augmented challenge support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 07/11] nvme-auth: augmented challenge support
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 10/11] nvmet-auth: implement support for augmented challenge
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 03/11] crypto/ffdhe: Finite Field DH Ephemeral Parameters
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 4/4] dt-bindings: Remove PicoXcell bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 11/11] nvme: add non-standard ECDH and curve25517 algorithms
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 06/11] nvme: Implement In-Band authentication
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 09/11] nvmet: Implement basic In-Band Authentication
- From: Stephan Müller <smueller@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]