Linux Crypto
[Prev Page][Next Page]
- [net-next v4 11/14] octeontx2-pf: cn10k: Get max mtu supported from admin function
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 05/14] octeontx2-pf: cn10k: Initialise NIX context
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 08/14] octeontx2-af: cn10k: Add RPM MAC support
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 03/14] octeontx2-af: cn10k: Update NIX/NPA context structure
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 06/14] octeontx2-pf: cn10k: Map LMTST region
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 09/14] octeontx2-af: cn10k: Add support for programmable channels
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 00/14] Add Marvell CN10K support
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 14/14] octeontx2-af: cn10k: MAC internal loopback support
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 01/14] octeontx2-af: cn10k: Add mbox support for CN10K platform
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 12/14] octeontx2-af: cn10k: Add RPM LMAC pause frame support
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [net-next v4 04/14] octeontx2-af: cn10k: Update NIX and NPA context in debugfs
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon/sec - fixes some log printing style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon/sec - fixes shash test error
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH 0/3] crypto:hisilicon/sec - fixes some coding style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH] coresight: etm4x: Fix merge resolution for amba rework
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/20] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v5 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH] coresight: etm4x: Fix merge resolution for amba rework
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: hisilicon/sec - fixes shash test error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: hisilicon/qm - fix request missing error
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 3/6] crypto: hisilicon/qm - fix the value of 'QM_SQC_VFT_BASE_MASK_V2'
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/6] crypto: hisilicon/qm - misc fixes
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/6] crypto: hisilicon/qm - removing driver after reset
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 4/6] crypto: hisilicon/qm - update irqflag
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 5/6] crypto: hisilicon/qm - do not reset hardware when CE happens
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: hisilicon/qm - fix printing format issue
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon/sec - fixes some driver coding style
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccree: fix spelling typo of allocated
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: hisilicon - enable new algorithms of SEC
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v5 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 06/11] crypto: qce: skcipher: Return error for non-blocksize data(ECB/CBC algorithms)
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v5 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v5 06/11] crypto: qce: skcipher: Return error for non-blocksize data(ECB/CBC algorithms)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 04/11] crypto: qce: skcipher: Return unsupported if any three keys are same for DES3 algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 09/11] crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 10/11] crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 07/11] crypto: qce: skcipher: Set ivsize to 0 for ecb(aes)
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 06/11] crypto: qce: skcipher: Return error for non-blocksize data(ECB/CBC algorithms)
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 11/11] crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH v4 01/11] crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 08/11] crypto: qce: skcipher: Improve the conditions for requesting AES fallback cipher
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 03/11] crypto: qce: skcipher: Return unsupported if key1 and key 2 are same for AES XTS algorithm
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 02/11] crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 01/11] crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v5 00/11] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: octeontx2 - fix -Wpointer-bool-conversion warning
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: marvell - fix ethernet driver dependency
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/20] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 06/20] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/20] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: marvell - fix ethernet driver dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 1/2] crypto: octeontx2 - fix -Wpointer-bool-conversion warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Will Deacon <will@xxxxxxxxxx>
- [net-next v3 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX operations
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- [PATCH 11/20] crypto: ux500: cryp_core: Fix formatting issue and add description for 'session_id'
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 14/20] crypto: caam: caampkc: Provide the name of the function
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 13/20] crypto: bcm: cipher: Provide description for 'req' and fix formatting issues
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 16/20] crypto: vmx: Source headers are not good kernel-doc candidates
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 12/20] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 15/20] crypto: caam: caamalg_qi2: Supply a couple of 'fallback' related descriptions
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 20/20] crypto: cavium: nitrox_isr: Demote non-compliant kernel-doc headers
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 17/20] crypto: nx: nx-aes-cbc: Headers comments should not be kernel-doc
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 19/20] crypto: nx: Demote header comment and add description for 'nbytes'
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 18/20] crypto: nx: nx_debugfs: Header comments should not be kernel-doc
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 09/20] crypto: ux500: cryp_irq: File headers are not good kernel-doc candidates
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 08/20] crypto: ux500: cryp: Demote some conformant non-kernel headers fix another
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 10/20] crypto: chelsio: chcr_algo: Fix a couple of kernel-doc issues caused by doc-rot
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 07/20] crypto: bcm: spu2: Fix a whole host of kernel-doc misdemeanours
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 05/20] crypto: bcm: spu: Fix formatting and misspelling issues
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 06/20] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 04/20] crypto: ux500: hash: hash_core: Fix worthy kernel-doc headers and remove others
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 03/20] crypto: chelsio: chcr_core: File headers are not good candidates for kernel-doc
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/20] crypto: bcm: util: Repair a couple of documentation formatting issues
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 01/20] crypto: hisilicon: sec_drv: Supply missing description for 'sec_queue_empty()'s 'queue' param
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 00/20] Rid W=1 warnings in Crypto
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - enable Elliptic curve cryptography
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 3/4] crypto: hisilicon/qm - fix use of 'dma_map_single'
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon/hpre - tiny fix
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 4/4] crypto: hisilicon - PASID fixed on Kunpeng 930
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 1/4] crypto: hisilicon/hpre - adapt the number of clusters
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH 0/4] crypto: hisilicon - some updates to adapt Kunpeng930
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: picoxcell - convert sysfs sprintf/snprintf family to sysfs_emit
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cavium: remove casting dma_alloc_coherent
- From: Xu Wang <vulab@xxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] ecdsa: implements ecdsa signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/11] crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/3] dt-bindings: iommu: renesas,ipmmu-vmsa: Make 'power-domains' conditionally required
- From: Yoshihiro Shimoda <yoshihiro.shimoda.uh@xxxxxxxxxxx>
- RE: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Yoshihiro Shimoda <yoshihiro.shimoda.uh@xxxxxxxxxxx>
- (subset) Re: [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 01/11] crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH] drivers: crypto: qat: qat_common: Two different lines fix the same spelling in the file adf_vf2pf_msg.c
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fixed optimzation to optimization in the file crypto/xor.c
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 4/4] ecdsa: implements ecdsa signature verification
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] crypto: keembay-ocs-aes - Fix 'q' assignment during CCM B0 generation
- From: Daniele Alessandrelli <daniele.alessandrelli@xxxxxxxxxxxxxxx>
- [PATCH] crypto: Fixed optimzation to optimization in the file crypto/xor.c
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- [PATCH] drivers: crypto: qat: qat_common: Two different lines fix the same spelling in the file adf_vf2pf_msg.c
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- [PATCH] drivers: crypto: qat: qat_common: Inside the comment a spelling fixed in adf_pf2vf_msg.c
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- [PATCH v4 05/11] crypto: qce: skcipher: Return error for zero length messages
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 09/11] crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 08/11] crypto: qce: skcipher: Improve the conditions for requesting AES fallback cipher
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 07/11] crypto: qce: skcipher: Set ivsize to 0 for ecb(aes)
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 10/11] crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 11/11] crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 04/11] crypto: qce: skcipher: Return unsupported if any three keys are same for DES3 algorithms
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 06/11] crypto: qce: skcipher: Return error for non-blocksize data(ECB/CBC algorithms)
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 03/11] crypto: qce: skcipher: Return unsupported if key1 and key 2 are same for AES XTS algorithm
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 02/11] crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 01/11] crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v4 00/11] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: safexcel driver for EIP197 and mini firmware features
- From: Maciej Pijanowski <maciej.pijanowski@xxxxxxxxx>
- Re: safexcel driver for EIP197 and mini firmware features
- From: Maciej Pijanowski <maciej.pijanowski@xxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Auger Eric <eric.auger@xxxxxxxxxx>
- [PATCH v2] hwrng: optee: Use device-managed registration API
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH] hwrng: optee -: Use device-managed registration API
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Nicolas Saenz Julienne <nsaenzjulienne@xxxxxxx>
- [PATCH v2 5/9] crypto: arm64/sha512-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 9/9] arm64: assembler: remove conditional NEON yield macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 6/9] crypto: arm64/aes-neonbs - remove NEON yield calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 7/9] crypto: arm64/aes-ce-mac - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 8/9] crypto: arm64/crc-t10dif - move NEON yield to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: safexcel driver for EIP197 and mini firmware features
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- [PATCH v2 4/9] crypto: arm64/sha3-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/9] crypto: arm64/sha2-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/9] crypto: arm64/sha1-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/9] arm64: assembler: add cond_yield macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key()
- From: Daniele Alessandrelli <daniele.alessandrelli@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: fix alignmask handling
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: fix alignmask handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: safexcel driver for EIP197 and mini firmware features
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Daniel Palmer <daniel@xxxxxxxx>
- Re: [PATCH 0/9] crypto: fix alignmask handling
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] hwrng: optee -: Use device-managed registration API
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Maxime Ripard <maxime@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Maxime Ripard <maxime@xxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] amba: minor fix and various cleanups
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] mailbox: arm_mhuv2: make remove callback return void
- From: Viresh Kumar <viresh.kumar@xxxxxxxxxx>
- Re: [PATCH v3 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: "Andrew Jeffery" <andrew@xxxxxxxx>
- Re: [PATCH 0/9] crypto: fix alignmask handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH 3/3] dt-bindings: Fix errors in 'if' schemas
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 2/3] dt-bindings: iommu: renesas,ipmmu-vmsa: Make 'power-domains' conditionally required
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/3] dt-bindings: Fix undocumented compatible strings in examples
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] mailbox: arm_mhuv2: make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.4 05/17] chtls: Fix potential resource leak
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 03/10] chtls: Fix potential resource leak
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] immutable branch for amba changes targeting v5.12-rc1
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [net-next v2 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [net-next v2 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam - Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 0/5] amba: minor fix and various cleanups
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: safexcel driver for EIP197 and mini firmware features
- From: Maciej Pijanowski <maciej.pijanowski@xxxxxxxxx>
- RE: safexcel driver for EIP197 and mini firmware features
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- [net-next v2 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX operations
- From: Geetha sowjanya <gakula@xxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] ecdsa: implements ecdsa signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: powerpc: remove unneeded semicolon
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam - Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- safexcel driver for EIP197 and mini firmware features
- From: Maciej Pijanowski <maciej.pijanowski@xxxxxxxxx>
- Re: safexcel driver for EIP197 and mini firmware features
- From: Maciej Pijanowski <maciej.pijanowski@xxxxxxxxx>
- Re: [PATCH] crypto: caam -Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 9/9] crypto: twofish - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/9] crypto: cast5 - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 7/9] crypto: cast6 - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 8/9] crypto: fcrypt - drop unneeded alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/9] crypto: camellia - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/9] crypto: michael_mic - fix broken misalignment handling
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/9] crypto: blowfish - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/9] crypto: serpent - use unaligned accessors instead of alignmask
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/9] crypto: serpent - get rid of obsolete tnepres variant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/9] crypto: fix alignmask handling
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Daniele Alessandrelli <daniele.alessandrelli@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] hw_random/timeriomem-rng: Fix cooldown period calculation
- From: Jan Henrik Weinstock <jan.weinstock@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] crypto: marvell - CRYPTO_DEV_OCTEONTX2_CPT should depend on ARCH_THUNDER2
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 4/4] ima: Support EC keys for signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam -Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: yumeng <yumeng18@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/4] ecdsa: implements ecdsa signature verification
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 3/4] ecdsa: change ecc.c and ecc.h to support ecdsa
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 2/4] ecdsa: prepare akcipher and x509 parser to use incoming ecdsa
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 1/4] ecdsa: add params to ecdsa algo
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 0/4] ecdsa: this patch implement signature verification
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Lijun Pan <lijunp213@xxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: remove some obsolete algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - add two RAS correctable errors processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: HKDF - remove duplicate memory clearing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] crypto: add RFC5869 HKDF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 4/8] x86/power: Restore Key Locker internal key from the ACPI S3/4 sleep states
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 8/9] crypto: arm64/crc-t10dif - move NEON yield to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 9/9] arm64: assembler: remove conditional NEON yield macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 7/9] crypto: arm64/aes-ce-mac - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/9] crypto: arm64/aes-neonbs - remove NEON yield calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/9] crypto: arm64/sha512-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/9] crypto: arm64/sha3-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/9] crypto: arm64/sha2-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/9] crypto: arm64/sha1-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] x86/power: Restore Key Locker internal key from the ACPI S3/4 sleep states
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: mmotm 2021-01-25-21-18 uploaded (octeontx2)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Nym Seddon <unseddd@xxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- [PATCH v2 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3 3/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Wolfram Sang <wsa@xxxxxxxxxx>
- [PATCH] crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 4/5] amba: Make the remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH 1/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] amba: minor fix and various cleanups
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- [PATCH] crypto/ccree: fix spelling typo of allocated
- kcryptd, copy big file, unresponsive system (GUI)
- From: Janusz Dziedzic <janusz.dziedzic@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.11
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 5.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM/SVM: add support for SEV attestation command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- linux-next-20210125: drivers/crypto/marvell/octeontx2/ build errors
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH] crypto: xor - avoid division by zero crash
- From: Helge Deller <deller@xxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: xor - avoid division by zero crash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: xor - avoid division by zero crash
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 4/7] security: DH - remove dead code for zero padding
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: add SP800-108 counter key derivation function
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: Add key derivation self-test support code
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: add RFC5869 HKDF
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 5/7] security: DH - use KDF implementation from crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 7/7] fs: HKDF - remove duplicate memory clearing
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC V2 5/5] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 4/5] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 3/5] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 2/5] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 1/5] crypto: aesni - fix coding style for if/else block
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH v2] KVM/SVM: add support for SEV attestation command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH v7 2/7] crypto: hisilicon/hpre - add some updates to adapt to Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 6/7] crypto: hisilicon/hpre - add 'ECDH' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 5/7] crypto: add curve 25519 and expose them
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 0/7] add ECDH and CURVE25519 algorithms support for Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 7/7] crypto: hisilicon/hpre - add 'CURVE25519' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 3/7] crypto: hisilicon/hpre - add algorithm type
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 1/7] crypto: hisilicon/hpre - add version adapt to new algorithms
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: aesni - fix more FPU handling and indirect call issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Add Support for Marvell OcteonTX2 CPT engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - add missing module aliases
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 09/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/5] crypto: remove Tiger 128/160/192 hash algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/5] crypto: remove RIPE-MD 320 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/5] crypto: remove RIPE-MD 128 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/5] crypto: remove RIPE-MD 256 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/5] crypto: remove some obsolete algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC V1 7/7] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 1/7] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Tee Hao Wei <angelsl@xxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 03/19] crypto: axis: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 04/19] crypto: caam: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 13/19] crypto: picoxcell: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 15/19] crypto: qce: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 11/19] crypto: mediatek: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 19/19] crypto: octeontx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 12/19] crypto: omap: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 18/19] crypto: talitos: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 17/19] crypto: s5p: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 08/19] crypto: hifn_795x: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 09/19] crypto: img-hash: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 10/19] crypto: ixp4xx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 05/19] crypto: cavium: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 02/19] crypto: atmel: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 00/19]crypto: convert tasklets to use new tasklet_setup API()
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC V1 5/7] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 2/7] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 2/2] crypto: talitos - Fix ctr(aes) on SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 0/6] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re:
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: problem with ccp-crypto module on apu
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] crypto: marvel/cesa - Fix tdma descriptor on 64-bit
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v4 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH] crypto: marvel/cesa - Fix tdma descriptor on 64-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Dave Martin <Dave.Martin@xxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: João Fonseca <jpedrofonseca@xxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - add two RAS correctable errors processing
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <apais@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re[2]: problem with ccp-crypto module on apu
- From: "Domen Stangar" <domen.stangar@xxxxxxxxx>
- Re: [RFC V1 0/7] Introduce AVX512 optimized crypto algorithms
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [linux-next:master 952/3956] crypto/blake2b_generic.c:73:13: warning: stack frame size of 9776 bytes in function 'blake2b_compress_one_generic'
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 0/7] Introduce AVX512 optimized crypto algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 1/7] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 7/7] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] crypto: aesni - fix more FPU handling and indirect call issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 5/7] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] crypto: aesni - release FPU during skcipher walk API calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] crypto: aesni - replace CTR function pointer with static call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 2/7] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [linux-next:master 952/3956] crypto/blake2b_generic.c:73:13: warning: stack frame size of 9776 bytes in function 'blake2b_compress_one_generic'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: John Donnelly <john.p.donnelly@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: Ovidiu Panait <ovidiu.panait@xxxxxxxxxxxxx>
- [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: John Donnelly <john.p.donnelly@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: octeontx2: register with linux crypto framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 7/9] crypto: octeontx2: add virtual function driver support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 8/9] crypto: octeontx2: add support to process the crypto request
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 6/9] crypto: octeontx2: add support to get engine capabilities
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 1/9] drivers: crypto: add Marvell OcteonTX2 CPT PF driver
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 5/9] crypto: octeontx2: add LF framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 4/9] crypto: octeontx2: load microcode and create engine groups
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 3/9] crypto: octeontx2: enable SR-IOV and mailbox communication with VF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 2/9] crypto: octeontx2: add mailbox communication with AF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 0/9] Add Support for Marvell OcteonTX2 CPT engine
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: arm64/sha - add missing module aliases
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [dm-crypt] [PATCH] dm crypt: defer the decryption to a tasklet, when being called with interrupts disabled
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 10/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 07/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 0/5] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay-ocs-hcu - Fix a WARN() message
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/21] crypto: x86 - remove glue helper module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: marvell: Fix a spelling s/fautly/faultly/ in comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: hisilicon - register device to uacce
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Rename struct device_private to bcm_device_private
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: qat - fix issues reported by smatch
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - configure arbiter mapping based on engines enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: gcm-aes-ni cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] crypto: octeontx2: load microcode and create engine groups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: bcm - Fix sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_HCU should depend on ARCH_KEEMBAY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Fix crash caused by NULL pointer
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH 00/10] Remove support for TX49xx
- From: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
- [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_HCU should depend on ARCH_KEEMBAY
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 0/6] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 19/19] crypto: octeontx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 18/19] crypto: talitos: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 17/19] crypto: s5p: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 15/19] crypto: qce: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 13/19] crypto: picoxcell: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 12/19] crypto: omap: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 11/19] crypto: mediatek: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 10/19] crypto: ixp4xx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 09/19] crypto: img-hash: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 08/19] crypto: hifn_795x: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 04/19] crypto: caam: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 05/19] crypto: cavium: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 03/19] crypto: axis: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 02/19] crypto: atmel: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 00/19]crypto: convert tasklets to use new tasklet_setup API()
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH 4/5] security: DH - use KDF implementation from crypto API
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: x86/crc-t10dif - convert to static call library API
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] random: fix the RNDRESEEDCRNG ioctl
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 7/7] crypto: powerpc/crc-t10dif - convert to static call API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/7] crypto: arm/crc-t10dif - convert to static call library API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/7] crypto: arm64/crc-t10dif - convert to static call API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/7] crypto: x86/crc-t10dif - convert to static call library API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/7] crypto: generic/crc-t10dif - expose both arch and generic shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/7] crypto: lib/crc-t10dif - add static call support for optimized versions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/7] crypto: crc-t10dif - turn library wrapper for shash into generic library
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 2/3] x86/cpu: Set low performance CRC32C flag on some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]