Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] backports: crypto user - make NETLINK_CRYPTO work inside netns
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: fix CRYPTO_LIB_* dependencies on CRYPTO
- From: Julian Braha <julianbraha@xxxxxxxxx>
- [PATCH] backports: crypto user - make NETLINK_CRYPTO work inside netns
- From: Jianmin Wang <jianmin@xxxxxxxxxxx>
- Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 0/5] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/5] crypto: ccp: Detect and reject vmalloc addresses destined for PSP
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 5/5] KVM: SVM: Allocate SEV command structures on local stack
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] crypto: ccp: Use the stack for small SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] crypto: ccp: Play nice with vmalloc'd memory for SEV command structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] crypto: ccp: Reject SEV commands with mismatching command buffer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] crypto: ccp: Detect and reject vmalloc addresses destined for PSP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] ccp: KVM: SVM: Use stack for SEV command buffers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH crypto] chcr: Read rxchannel-id from firmware
- From: Ayush Sawal <ayush.sawal@xxxxxxxxxxx>
- [PATCH] crypto: qat: Fix a double free in adf_create_ring
- From: Lv Yunlong <lyl2019@xxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: hisilicon/hpre - delete redundant log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v2] crypto: hisilicon/qm - delete redundant code
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH][next] crypto: sun8i-ss: Fix memory leak of pad
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] ecc: delete a useless function declaration
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH] ecc: delete a useless function declaration
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - delete redundant '\n'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix a typo and delete redundant blank line
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: poly1305: fix poly1305_core_setkey() declaration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fcrypt: Remove 'do while(0)' loop for single statement macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keywrap: Remove else after break statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - use the correct HiSilicon copyright
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix error path in adf_isr_resource_alloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: omap - Use of_device_get_match_data() helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete redundant log
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete redundant log
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: replace memset by memzero_explicit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - delete redundant code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto:hisilicon/sec - fixup checking the 3DES weak key
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH][next] crypto: sun8i-ss: Fix memory leak of pad
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: sa2ul: Fix memory lead of rxd
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][V2] crypto: sa2ul: Fix memory leak of rxd
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH v2 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH 0/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] use crc32 instead of md5 for hibernation e820 integrity check
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] crypto: cbc - fix coding style
- From: Zhiqi Song <songzhiqi1@xxxxxxxxxx>
- [PATCH] crypto: api - fix coding style
- From: Zhiqi Song <songzhiqi1@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: rockchip/rk3288_crypto_ahash - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 18/18] keyctl_pkey: Add pkey parameter slen to pass in PSS salt length
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp -A value assigned to a variable is never used.
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon/sgl - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon/sgl - fix the sg buf unmap
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/5] bug fix and clear coding style
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon/sgl - fix the soft sg map to hardware sg
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon/sgl - add a comment for block size initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: crypto: FIPS 200 mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: deflate - Remove useless call "zlib_inflateEnd"
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH -next] crypto: ccp - Use DEFINE_SPINLOCK() for spinlock
- From: Tang Yizhou <tangyizhou@xxxxxxxxxx>
- [PATCH v9 2/3] lib: zstd: Add decompress_sources.h for decompress_unzstd
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [GIT PULL][PATCH v9 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v9 1/3] lib: zstd: Add kernel-specific API
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- crypto: FIPS 200 mode
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- [PATCH 15/18] crypto: rsa-psspad: Provide PSS signature verify operation
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 18/18] keyctl_pkey: Add pkey parameter slen to pass in PSS salt length
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 17/18] crypto: Accept pss as valid encoding during signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 14/18] crypto: Implement MGF1 Mask Generation Function for RSASSA-PSS
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 16/18] crypto: rsa-psspad: Implement signature verify callback
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 12/18] crypto: rsa-psspad: Introduce shash alloc/dealloc helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 13/18] crypto: rsa-psspad: Get signature salt length from a given signature
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 11/18] crypto: Scaffolding for RSA-PSS signature style
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 09/18] crypto: Extend akcipher API to pass signature parameters
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 10/18] crypto: rsa: Move struct rsa_mpi_key definition to rsa.h
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 08/18] crypto: rsa: Move rsapad_akcipher_setup_child and callback to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 06/18] crypto: rsa: Start moving RSA common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 07/18] crypto: rsa: Move more common code to rsa-common
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 04/18] crypto: rsa-pkcs1pad: Pull out child req processing code into helpers
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 05/18] crypto: rsa-pkcs1pad: Rename pkcs1pad_* structs to rsapad_*
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 03/18] crypto: rsa-pkcs1pad: Extract pkcs1pad_create into a generic helper
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 02/18] crypto: rsa-pkcs1pad: Rename pkcs1pad-specific functions to rsapad
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 01/18] X.509: Parse RSASSA-PSS style certificates
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [PATCH 00/18] Implement RSASSA-PSS signature verification
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: Chris von Recklinghausen <crecklin@xxxxxxxxxx>
- Re: Fix hibernation in FIPS mode?
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- [PATCH -next] crypto: hisilicon/hpre - fix a typo in hpre_crypto.c
- From: Ruiqi Gong <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2 3/9] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] crypto: ccp -A value assigned to a variable is never used.
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/9] arm64: assembler: introduce wxN aliases for wN registers
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 1/9] arm64: assembler: remove conditional NEON yield macros
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: "yekai(A)" <yekai13@xxxxxxxxxx>
- [PATCH v2] crypto: hisilicon/sec - Fix a module parameter error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: hisilicon/sgl - fixup coding style
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 4/5] crypto: hisilicon/sgl - fix the soft sg map to hardware sg
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: hisilicon/sgl - delete unneeded variable initialization
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: hisilicon/sgl - fix the sg buf unmap
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: hisilicon/sgl - add some dfx logs
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: hisilicon/sgl - fixup coding style
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH v2 0/5] bug fix and clear coding style
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: v5.12.0-rc5: the kernel panics if FIPS mode is on
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] Documentation: crypto: add info about "fips=" boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: add info about "fips=" boot option
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: add info about "fips=" boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: add info about "fips=" boot option
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: possible NULL reference
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] Documentation: crypto: add info about "fips=" boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: v5.12.0-rc5: the kernel panics if FIPS mode is on
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Fix hibernation in FIPS mode?
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- v5.12.0-rc5: the kernel panics if FIPS mode is on
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH] crypto: allwinner: add missing CRYPTO_ prefix
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: chelsio: fix incorrect kernel-doc comment syntax in file
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: chelsio: fix incorrect kernel-doc comment syntax in file
- From: Aditya Srivastava <yashsri421@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: mips: add poly1305-core.S to .gitignore
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] lib: zstd: Add kernel-specific API
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - check if debugfs opened
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: mips: add poly1305-core.S to .gitignore
- From: Ilya Lipnitskiy <ilya.lipnitskiy@xxxxxxxxx>
- [PATCH v2] crypto: mips: add poly1305-core.S to .gitignore
- From: Ilya Lipnitskiy <ilya.lipnitskiy@xxxxxxxxx>
- [PATCH] crypto: mips: add poly1305-core.S to .gitignore
- From: Ilya Lipnitskiy <ilya.lipnitskiy@xxxxxxxxx>
- Re: [PATCH v8 1/3] lib: zstd: Add kernel-specific API
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - Fix a module parameter error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/sec - Fix a module parameter error
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH v8 1/3] lib: zstd: Add kernel-specific API
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/sec - Fix a module parameter error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH] crypto: hisilicon - check if debugfs opened
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon - delete redundant '\n'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - delete redundant log
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - fix a typo and delete redundant blank line
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hisilicon/zip - adjust functions location
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- Re: [PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH v8 3/3] lib: zstd: Upgrade to latest upstream zstd version 1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- Re: [PATCH v8 3/3] lib: zstd: Upgrade to latest upstream zstd version 1.4.10
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v8 2/3] lib: zstd: Add decompress_sources.h for decompress_unzstd
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v8 1/3] lib: zstd: Add kernel-specific API
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH v8 0/3] Update to zstd-1.4.10
- From: Nick Terrell <nickrterrell@xxxxxxxxx>
- [PATCH] crypto: fcrypt: Remove 'do while(0)' loop for single statement macro
- From: Milan Djurovic <mdjurovic@xxxxxxxxxxxx>
- [PATCH] crypto: keywrap: Remove else after break statement
- From: Milan Djurovic <mdjurovic@xxxxxxxxxxxx>
- Re: [PATCH] crypto: sm3 - use the more precise type u32 instead of unsigned int
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx: fix incorrect kernel-doc comment syntax in files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx: fix incorrect kernel-doc comment syntax in files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: fix incorrect kernel-doc comment syntax
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: amcc: fix incorrect kernel-doc comment syntax in files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: hisilicon/qm - support doorbell isolation and queue number configuration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix "hpre_ctx_init" resource leak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - fix Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - fix the check on dma address
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon/hpre - remove 'CONFIG_CRYPTO_DH'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Correct an error in the comments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Rid W=1 warnings in Crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Fix the parameter of dma_map_sg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: intel - Fix included header from 'asm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sm3 - use the more precise type u32 instead of unsigned int
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: hisilicon - use the correct HiSilicon copyright
- From: Hao Fang <fanghao11@xxxxxxxxxx>
- Re: [PATCH -next] drivers: crypto: CRYPTO_DEV_HISI_HPRE select CRYPTO_ECC and CRYPTO_ECDH
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH -next] drivers: crypto: CRYPTO_DEV_HISI_HPRE select CRYPTO_ECC and CRYPTO_ECDH
- From: Zhang Jianhua <zhangjianhua18@xxxxxxxxxx>
- Re: [RFC 1/1] crypto: dcp - add power management support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] pkcs7: Use octal permissions '0444'
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - rsa key should not be empty
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx: fix incorrect kernel-doc comment syntax in files
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: async_tx/async_xor.c: Few mundane spello fixes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: async_tx/async_xor.c: Few mundane spello fixes
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- [PATCH] crypto: sm3 - use the more precise type u32 instead of unsigned int
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: atmel - use memzero_explicit() for clearing data
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/3] crypto: stm32 - use memzero_explicit() for clearing data
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 0/3] crypto: replace memset by memzero_explicit
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/3] crypto: qce - use memzero_explicit() for clearing data
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - delete redundant code
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] crypto: qat - fix error path in adf_isr_resource_alloc()
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon/hpre - fix build error without CONFIG_CRYPTO_ECDH
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC Part2 PATCH 06/30] x86/fault: dump the RMP entry on #PF
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC Part2 PATCH 06/30] x86/fault: dump the RMP entry on #PF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC Part2 PATCH 30/30] KVM: X86: Add support to handle the RMP nested page fault
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 28/30] KVM: SVM: add support to handle Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 29/30] KVM: X86: export the kvm_zap_gfn_range() for the SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 27/30] KVM: SVM: add support to handle MSR based Page State Change VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 26/30] KVM: SVM: add support to handle GHCB GPA register VMGEXIT
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 24/30] KVM: X86: define new RMP check related #NPF error bits
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 23/30] KVM: X86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 25/30] KVM: X86: update page-fault trace to log the 64-bit error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 22/30] x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by SEV
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 20/30] KVM: SVM: add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 19/30] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 21/30] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 18/30] KVM: SVM: add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 17/30] KVM: SVM: add KVM_SEV_SNP_LAUNCH_START command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 15/30] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 14/30] KVM: SVM: make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 16/30] KVM: SVM: add KVM_SNP_INIT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 13/30] KVM: SVM: add initial SEV-SNP support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 11/30] crypto:ccp: provide APIs to issue SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 12/30] crypto ccp: handle the legacy SEV command when SNP is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 10/30] crypto: ccp: shutdown SNP firmware on kexec
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 08/30] crypto:ccp: define the SEV-SNP commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 09/30] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 06/30] x86/fault: dump the RMP entry on #PF
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 07/30] mm: add support to split the large THP based on RMP violation
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 03/30] x86: add helper functions for RMPUPDATE and PSMASH instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 02/30] x86/sev-snp: add RMP entry lookup helpers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 01/30] x86: Add the host SEV-SNP initialization support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC Part2 PATCH 00/30] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH -next] crypto: hisilicon/hpre - fix build error without CONFIG_CRYPTO_ECDH
- From: "'Wei Yongjun" <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] init/Kconfig: support sign module with SM2-with-SM3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] support sign module with SM2-with-SM3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] pkcs7: make parser enable SM2 and SM3 algorithms combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] init/Kconfig: Support sign module with SM3 hash algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] init/Kconfig: Support sign module with SM3 hash algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] init/Kconfig: Support sign module with SM3 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] init/Kconfig: Support sign module with SM3 hash algorithm
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] init/Kconfig: Support sign module with SM3 hash algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon/hpre: fix link error
- From: tanghui20 <tanghui20@xxxxxxxxxx>
- [PATCH -next] crypto: hisilicon/hpre: fix link error
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH] crypto: poly1305: fix poly1305_core_setkey() declaration
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] s390/crc32-vx: Couple of typo fixes
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: poly1305: fix poly1305_core_setkey() declaration
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] s390/crc32-vx: Couple of typo fixes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: poly1305: fix poly1305_core_setkey() declaration
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] s390/crc32-vx: Couple of typo fixes
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 06/10] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - fix W=1 "cannot understand" warning
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] hwrng: omap - Use of_device_get_match_data() helper
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] hwrng: cctrng - remove the redundant log
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- [PATCH] hwrng: core - Use sysfs_emit to replace snprintf
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: nx: fix incorrect kernel-doc comment syntax in files
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: fix incorrect kernel-doc comment syntax
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: amcc: fix incorrect kernel-doc comment syntax in files
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 07/10] crypto: caam: caampkc: Provide the name of the function and provide missing descriptions
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: nx: fix incorrect kernel-doc comment syntax in files
- From: Aditya Srivastava <yashsri421@xxxxxxxxx>
- [PATCH] crypto: ux500: fix incorrect kernel-doc comment syntax
- From: Aditya Srivastava <yashsri421@xxxxxxxxx>
- [PATCH] crypto: amcc: fix incorrect kernel-doc comment syntax in files
- From: Aditya Srivastava <yashsri421@xxxxxxxxx>
- [PATCH] crypto: vmx: fix incorrect kernel-doc comment syntax in files
- From: Aditya Srivastava <yashsri421@xxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - fix W=1 "cannot understand" warning
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel-ecc - fix W=1 "cannot understand" warning
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH 1/4] crypto: hisilicon/qm - set the total number of queues
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/4] crypto: hisilicon/qm - support doorbell isolation and queue number configuration
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon/qm - move 'CURRENT_QM' code to qm.c
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/4] crypto: hisilicon/qm - add queue isolation support for Kunpeng930
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 3/4] crypto: hisilicon/qm - set the number of queues for function
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH] md/raid6: Couple of typo fixes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxxxxxxxxxxx>
- Re: stable request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: hw_random: delete redundant printing of return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: arm - clean up redundant helper macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/blake2s - fix for big endian
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: stable request
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - fix Kconfig
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - fix "hpre_ctx_init" resource leak
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon - fix the check on dma address
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon/hpre - remove 'CONFIG_CRYPTO_DH'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/hpre - optimise 'hpre_algs_register' error path
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/hpre - delete wrap of 'CONFIG_CRYPTO_DH'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [PATCH for-stable-5.4] crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] crypto: Correct an error in the comments
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH] md/raid6: Couple of typo fixes
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- Re: stable request
- From: Thomas Backlund <tmb@xxxxxx>
- [PATCH 3/4] crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH 1/4] crypto: hisilicon/zip - adjust functions location
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH 0/4]crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v5 2/2] crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v5 1/2] crypto: qat - don't release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [RFC 1/1] crypto: dcp - add power management support
- From: "Dragos Rosioru (OSS)" <dragos.rosioru@xxxxxxxxxxx>
- [RFC 0/1] crypto: dcp - add power management support
- From: "Dragos Rosioru (OSS)" <dragos.rosioru@xxxxxxxxxxx>
- Re: stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH for-stable-5.4] crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: stable request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v4 1/2] crypto: qat - don't release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v4 0/2] crypto: qat: fix couple crashes duing error handling
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH 05/10] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: stable request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 10/10] crypto: cavium: nitrox_isr: Demote non-compliant kernel-doc headers
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 07/10] crypto: caam: caampkc: Provide the name of the function and provide missing descriptions
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 08/10] crypto: vmx: Source headers are not good kernel-doc candidates
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 09/10] crypto: nx: nx-aes-cbc: Repair some kernel-doc problems
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 06/10] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 05/10] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 03/10] crypto: chelsio: chcr_core: Fix some kernel-doc issues
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 04/10] crypto: ux500: hash: hash_core: Fix worthy kernel-doc headers and remove others
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 02/10] crypto: bcm: Fix a whole host of kernel-doc misdemeanours
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 01/10] crypto: hisilicon: sec_drv: Supply missing description for 'sec_queue_empty()'s 'queue' param
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH v3 00/10] Rid W=1 warnings in Crypto
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
- From: Antoine Tenart <atenart@xxxxxxxxxx>
- [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 1/3] dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- Re: [PATCH 4/7] crypto: qce: Add support for AEAD algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
- From: Milan Djurovic <mdjurovic@xxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v1 1/3] dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 10/10] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 09/10] x509: Add OID for NIST P384 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 08/10] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 05/10] ecdsa: Register NIST P384 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 04/10] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 03/10] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 06/10] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 01/10] oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 07/10] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v1 2/3] KEYS: trusted: implement fallback to kernel RNG
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
- From: Jay Fang <f.fangjian@xxxxxxxxxx>
- Re: stable request
- From: Thomas Backlund <tmb@xxxxxx>
- Re: stable request
- From: Thomas Backlund <tmb@xxxxxx>
- Re: stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: stable request
- From: Thomas Backlund <tmb@xxxxxx>
- [syzbot] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- stable request
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: cavium - Fix the parameter of dma_unmap_sg()
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [PATCH v2 1/4] crypto: amlogic - Fix the parameter of dma_unmap_sg()
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [PATCH v2 0/4] Fix the parameter of dma_map_sg()
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: allwinner - Fix the parameter of dma_unmap_sg()
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: ux500 - Fix the parameter of dma_unmap_sg()
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: ccp - fix command queuing to TEE ring buffer
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v3 1/2] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v3 0/2] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 4/8] dt-bindings/clock: qcom: sm8250: Add gcc clocks for sm8250 crypto block
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH] hwrng: intel - Fix included header from 'asm
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] certs: Factor out the blacklist hash creation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: hw_random: delete redundant printing of return value
- From: Wang Qing <wangqing@xxxxxxxx>
- [PATCH v4 2/3] crypto: hisilicon/sec - fixes some coding style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 3/3] crypto: hisilicon/sec - fixes some driver coding style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v4 1/3] crypto: hisilicon/sec - fixes a printing error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- [PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: hisilicon/sec - fixes some log printing style
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [PATCH v7 4/5] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v3 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v3 0/2] crypto: qat: fix couple crashes duing error handling
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - dont release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v2 0/2] crypto: qat: fix couple crashes duing error handling
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH v6 0/3] hwrng: bcm2835: add reset support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss - simplify optional reset handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: qat - fixes related to 'dma_map_single'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: allwinner: sun8i-ce: fix error return code in sun8i_ce_prng_generate()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] add ECDH and CURVE25519 algorithms support for Kunpeng 930
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Don't initialize SEV support without the SEV feature
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: api - check for ERR pointers in crypto_destroy_tfm()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: Fix memory leak of object d when dma_iv fails to map
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: pic32 - Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cctrng - Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium - remove unused including <linux/version.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] crypto: qce: Add support for AEAD algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: hisilicon/sec - fixes some log printing style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: qat: fix couple crashes duing error handling
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: fix result memory leak on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - dont release uninitialized resources
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- [PATCH 0/2] crypto: qat: fix couple crashes duing error handling
- From: Tong Zhang <ztong0001@xxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: set quality to 1000
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v11 10/10] certs: Add support for using elliptic curve keys for signing modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 05/10] ecdsa: Register NIST P384 and extend test suite
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 03/10] crypto: Add NIST P384 curve parameters
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: arm/chacha-scalar - switch to common rev_l macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 0/2] crypto: arm - clean up redundant helper macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: arm/aes-scalar - switch to common rev_l/mov_l macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/blake2s - fix for big endian
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: arm/blake2s - fix for big endian
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: arm/aes-scalar - switch to common rev_32/mov_l macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: arm/aes-scalar - switch to common rev_32/mov_l macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: arm/chacha-scalar - switch to common rev_32 macro
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/8] arm64/dts: qcom: sm8250: Add dt entries to support crypto engine.
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 7/8] drivers: crypto: qce: Enable support for crypto engine on sm8250.
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 5/8] clk: qcom: clk-rpmh: Add CE clock on sm8250
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 6/8] clk: qcom: Add gcc clocks for crypto block on sm8250
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 4/8] dt-bindings/clock: qcom: sm8250: Add gcc clocks for sm8250 crypto block
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 3/8] arm64/dts: qcom: sdm845: Use RPMH_CE_CLK macro directly
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 0/8] Enable Qualcomm Crypto Engine on sm8250
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH 1/8] dt-bindings: qcom-qce: Add 'iommus' to required properties
- From: Bhupesh Sharma <bhupesh.sharma@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: ccp - fix command queuing to TEE ring buffer
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v2 1/2] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH v2 0/2] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 0/3] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - update copyright year for tee
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH 0/3] PSP TEE driver update and bug fixes
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - update copyright year for tee
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <apais@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v5 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/3] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH 3/3] crypto: ccp - update copyright year for tee
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH 2/3] crypto: ccp - fix command queuing to TEE ring buffer
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- [PATCH 0/3] PSP TEE driver update and bug fixes
- From: Rijo Thomas <Rijo-john.Thomas@xxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: Fix memory leak of object d when dma_iv fails to map
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: allwinner: sun8i-ce: fix error return code in sun8i_ce_prng_generate()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v6 2/3] dt-bindings: rng: bcm2835: document reset support
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v6 1/3] dt-bindings: rng: bcm2835: add clock constraints
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v6 3/3] hwrng: bcm2835: add reset support
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v6 2/3] dt-bindings: rng: bcm2835: document reset support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v6 1/3] dt-bindings: rng: bcm2835: add clock constraints
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v1 3/3] crypto: sa2ul: Add support for AM64
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v1 1/3] dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v1 2/3] crypto: sa2ul: Support for per channel coherency
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- [PATCH v1 0/3] Update dt-bindings and sa2ul driver for AM64x SoCs
- From: Vaibhav Gupta <vaibhavgupta40@xxxxxxxxx>
- Re: [PATCH v11 02/10] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - Move simd prototypes into aegis.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: aegis128 - Move simd prototypes into aegis.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: arm/chacha-scalar - switch to common rev_32 macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: arm - clean up redundant helper macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: arm/aes-scalar - switch to common rev_32/mov_l macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: please apply 660d2062190db131 to v5.4+
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v11 09/10] x509: Add OID for NIST P384 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 08/10] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 06/10] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 10/10] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 04/10] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 05/10] ecdsa: Register NIST P384 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 07/10] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 00/10] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 03/10] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 01/10] oid_registry: Add OIDs for ECDSA with sha224/256/384/512
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v11 02/10] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 8/9] x509: Add OID for NIST P384 and extend parser for it
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 2/9] crypto: Add NIST P384 curve parameters
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 6/9] x509: Add support for parsing x509 certs with ECDSA keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- please apply 660d2062190db131 to v5.4+
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: sun4i-ss - simplify optional reset handling
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] hwrng: bcm2835: add reset support
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v6 3/3] hwrng: bcm2835: add reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v6 2/3] dt-bindings: rng: bcm2835: document reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v6 1/3] dt-bindings: rng: bcm2835: add clock constraints
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v6 0/3] hwrng: bcm2835: add reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v2 2/2] crypto: qat - fix use of 'dma_map_single'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v2 0/2] crypto: qat - fixes related to 'dma_map_single'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - fix unmap invalid dma address
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: set quality to 1000
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH] crypto: allwinner: sun8i-ce: fix error return code in sun8i_ce_prng_generate()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v10 8/9] x509: Add OID for NIST P384 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/9] ecdsa: Register NIST P384 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/9] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/9] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 7/9] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/9] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/9] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/9] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/9] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Don't initialize SEV support without the SEV feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: set quality to 1000
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v5 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 0/7] Add support for AEAD algorithms in Qualcomm Crypto Engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: CAAM: kernel BUG at drivers/crypto/caam/jr.c:230! (and dma-coherent query)
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] hwrng: bcm2835: set quality to 1000
- From: Nicolas Saenz Julienne <nsaenzjulienne@xxxxxxx>
- Re: [PATCH v3 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix use of 'dma_map_single'
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Nicolas Saenz Julienne <nsaenzjulienne@xxxxxxx>
- Re: [PATCH v3 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- Re: [PATCH v5 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Nicolas Saenz Julienne <nsaenzjulienne@xxxxxxx>
- Re: [PATCH v3 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Nicolas Saenz Julienne <nsaenzjulienne@xxxxxxx>
- Re: [PATCH 05/10] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v5 2/2] hwrng: bcm2835: add reset support
- From: Philipp Zabel <p.zabel@xxxxxxxxxxxxxx>
- [PATCH v5 2/2] hwrng: bcm2835: add reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v5 0/2] hwrng: bcm2835: add reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH v5 1/2] dt-bindings: rng: bcm2835: document reset support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- Re: [PATCH v2] crypto/nx: add missing call to of_node_put()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: omap - Fix included header from 'asm'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - delete some redundant code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFT PATCH] crypto: s5p-sss - initialize APB clock after the AXI bus clock for SlimSSS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss: fix result memory leak on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]