Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam -Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: yumeng <yumeng18@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/4] ecdsa: implements ecdsa signature verification
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 3/4] ecdsa: change ecc.c and ecc.h to support ecdsa
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 2/4] ecdsa: prepare akcipher and x509 parser to use incoming ecdsa
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 1/4] ecdsa: add params to ecdsa algo
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 0/4] ecdsa: this patch implement signature verification
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Lijun Pan <lijunp213@xxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: remove some obsolete algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - add two RAS correctable errors processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: HKDF - remove duplicate memory clearing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] crypto: add RFC5869 HKDF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 4/8] x86/power: Restore Key Locker internal key from the ACPI S3/4 sleep states
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 8/9] crypto: arm64/crc-t10dif - move NEON yield to C code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 9/9] arm64: assembler: remove conditional NEON yield macros
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 7/9] crypto: arm64/aes-ce-mac - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/9] crypto: arm64/aes-neonbs - remove NEON yield calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/9] crypto: arm64/sha512-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/9] crypto: arm64/sha3-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/9] crypto: arm64/sha2-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/9] crypto: arm64/sha1-ce - simplify NEON yield
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/9] arm64: assembler: add cond_yield macro
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/9] arm64: rework NEON yielding to avoid scheduling from asm code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/8] x86/power: Restore Key Locker internal key from the ACPI S3/4 sleep states
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: mmotm 2021-01-25-21-18 uploaded (octeontx2)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Nym Seddon <unseddd@xxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- [PATCH v2 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3 3/3] x509: Add support for NIST p192 keys in certificates and akcipher
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Wolfram Sang <wsa@xxxxxxxxxx>
- [PATCH] crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 2/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 4/5] amba: Make the remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] amba: Make the remove callback return void
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH 1/3] x509: Add support for parsing x509 certs with NIST p256 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] amba: minor fix and various cleanups
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- [PATCH] crypto/ccree: fix spelling typo of allocated
- kcryptd, copy big file, unresponsive system (GUI)
- From: Janusz Dziedzic <janusz.dziedzic@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.11
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] Crypto Fixes for 5.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM/SVM: add support for SEV attestation command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- linux-next-20210125: drivers/crypto/marvell/octeontx2/ build errors
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v3 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH] crypto: xor - avoid division by zero crash
- From: Helge Deller <deller@xxxxxx>
- Re: [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: xor - avoid division by zero crash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: xor - avoid division by zero crash
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/7] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 4/7] security: DH - remove dead code for zero padding
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: add SP800-108 counter key derivation function
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: Add key derivation self-test support code
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: add RFC5869 HKDF
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 6/7] fs: use HKDF implementation from kernel crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 5/7] security: DH - use KDF implementation from crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 7/7] fs: HKDF - remove duplicate memory clearing
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC V2 5/5] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 4/5] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 3/5] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 2/5] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 0/5] Introduce AVX512 optimized crypto algorithms
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [RFC V2 1/5] crypto: aesni - fix coding style for if/else block
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH v2] KVM/SVM: add support for SEV attestation command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH v7 2/7] crypto: hisilicon/hpre - add some updates to adapt to Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 6/7] crypto: hisilicon/hpre - add 'ECDH' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 4/7] crypto: add ecc curve and expose them
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 5/7] crypto: add curve 25519 and expose them
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 0/7] add ECDH and CURVE25519 algorithms support for Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 7/7] crypto: hisilicon/hpre - add 'CURVE25519' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 3/7] crypto: hisilicon/hpre - add algorithm type
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v7 1/7] crypto: hisilicon/hpre - add version adapt to new algorithms
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: aesni - fix more FPU handling and indirect call issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Add Support for Marvell OcteonTX2 CPT engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - add missing module aliases
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 09/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 5/5] crypto: remove Salsa20 stream cipher algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/5] crypto: remove Tiger 128/160/192 hash algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/5] crypto: remove RIPE-MD 320 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/5] crypto: remove RIPE-MD 128 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/5] crypto: remove RIPE-MD 256 hash algorithm
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/5] crypto: remove some obsolete algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC V1 7/7] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 1/7] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Tee Hao Wei <angelsl@xxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 03/19] crypto: axis: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 04/19] crypto: caam: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 13/19] crypto: picoxcell: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 15/19] crypto: qce: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 11/19] crypto: mediatek: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 19/19] crypto: octeontx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 12/19] crypto: omap: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 18/19] crypto: talitos: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 17/19] crypto: s5p: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 08/19] crypto: hifn_795x: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 09/19] crypto: img-hash: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 10/19] crypto: ixp4xx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 05/19] crypto: cavium: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 02/19] crypto: atmel: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v4 00/19]crypto: convert tasklets to use new tasklet_setup API()
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC V1 5/7] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 2/7] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- [PATCH 1/2] crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 2/2] crypto: talitos - Fix ctr(aes) on SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 0/6] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re:
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: problem with ccp-crypto module on apu
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] crypto: marvel/cesa - Fix tdma descriptor on 64-bit
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH 2/4] PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/4] modsign: Add codeSigning EKU when generating X.509 key generation config
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/4] Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v4 0/4] Check codeSigning extended key usage extension
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/4] X.509: Add CodeSigning extended key usage parsing
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH] crypto: marvel/cesa - Fix tdma descriptor on 64-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] arm64: fpsimd: run kernel mode NEON with softirqs disabled
- From: Dave Martin <Dave.Martin@xxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: João Fonseca <jpedrofonseca@xxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [BUG] marvell/cesa - Fix sparse warnings breaks driver
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - add two RAS correctable errors processing
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
- From: Hui Tang <tanghui20@xxxxxxxxxx>
- Re: [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <apais@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re[2]: problem with ccp-crypto module on apu
- From: "Domen Stangar" <domen.stangar@xxxxxxxxx>
- Re: [RFC V1 0/7] Introduce AVX512 optimized crypto algorithms
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [linux-next:master 952/3956] crypto/blake2b_generic.c:73:13: warning: stack frame size of 9776 bytes in function 'blake2b_compress_one_generic'
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 0/7] Introduce AVX512 optimized crypto algorithms
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 1/7] x86: Probe assembler capabilities for VAES and VPLCMULQDQ support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 7/7] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/2] crypto: aesni - fix more FPU handling and indirect call issues
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 5/7] crypto: aesni - AES CTR x86_64 "by16" AVX512 optimization
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] crypto: aesni - release FPU during skcipher walk API calls
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/2] crypto: aesni - replace CTR function pointer with static call
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 2/7] crypto: crct10dif - Accelerated CRC T10 DIF with vectorized instruction
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [linux-next:master 952/3956] crypto/blake2b_generic.c:73:13: warning: stack frame size of 9776 bytes in function 'blake2b_compress_one_generic'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: John Donnelly <john.p.donnelly@xxxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC V1 3/7] crypto: ghash - Optimized GHASH computations
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] crypto: keembay: ocs-aes: use 64-bit arithmetic for computing bit_len
- From: Ovidiu Panait <ovidiu.panait@xxxxxxxxxxxxx>
- [PATCH v2] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: John Donnelly <john.p.donnelly@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: lib/chacha20poly1305 - define empty module exit function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: octeontx2: register with linux crypto framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 7/9] crypto: octeontx2: add virtual function driver support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 8/9] crypto: octeontx2: add support to process the crypto request
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 6/9] crypto: octeontx2: add support to get engine capabilities
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 1/9] drivers: crypto: add Marvell OcteonTX2 CPT PF driver
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 5/9] crypto: octeontx2: add LF framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 4/9] crypto: octeontx2: load microcode and create engine groups
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 3/9] crypto: octeontx2: enable SR-IOV and mailbox communication with VF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 2/9] crypto: octeontx2: add mailbox communication with AF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 0/9] Add Support for Marvell OcteonTX2 CPT engine
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: arm64/sha - add missing module aliases
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [dm-crypt] [PATCH] dm crypt: defer the decryption to a tasklet, when being called with interrupts disabled
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 10/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 07/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 0/5] running kernel mode SIMD with softirqs disabled
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay-ocs-hcu - Fix a WARN() message
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/21] crypto: x86 - remove glue helper module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: marvell: Fix a spelling s/fautly/faultly/ in comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: hisilicon - register device to uacce
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Rename struct device_private to bcm_device_private
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: qat - fix issues reported by smatch
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - configure arbiter mapping based on engines enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: gcm-aes-ni cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] crypto: octeontx2: load microcode and create engine groups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: bcm - Fix sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_HCU should depend on ARCH_KEEMBAY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Fix crash caused by NULL pointer
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH 00/10] Remove support for TX49xx
- From: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
- [PATCH RESEND] random: remove dead code left over from blocking pool
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RESEND] random: initialize ChaCha20 constants with correct endianness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RESEND] random: fix the RNDRESEEDCRNG ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_HCU should depend on ARCH_KEEMBAY
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH] crypto: public_key: check that pkey_algo is non-NULL before passing it to strcmp()
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 6/6] drivers: crypto: qce: Remove totallen and offset in qce_start
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 4/6] drivers: crypto: qce: common: Set data unit size to message length for AES XTS transformation
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 5/6] drivers: crypto: qce: Remover src_tbl from qce_cipher_reqctx
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 2/6] drivers: crypto: qce: sha: Hold back a block of data to be transferred as part of final
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 3/6] drivers: crypto: qce: skcipher: Fix regressions found during fuzz testing
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 1/6] drivers: crypto: qce: sha: Restore/save ahash state with custom struct in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v2 0/6] Regression fixes/clean ups in the Qualcomm crypto engine driver
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- [PATCH v3 19/19] crypto: octeontx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 18/19] crypto: talitos: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 17/19] crypto: s5p: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 15/19] crypto: qce: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 13/19] crypto: picoxcell: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 12/19] crypto: omap: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 11/19] crypto: mediatek: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 10/19] crypto: ixp4xx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 09/19] crypto: img-hash: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 08/19] crypto: hifn_795x: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 04/19] crypto: caam: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 05/19] crypto: cavium: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 03/19] crypto: axis: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 02/19] crypto: atmel: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v3 00/19]crypto: convert tasklets to use new tasklet_setup API()
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- Re: [PATCH 4/5] security: DH - use KDF implementation from crypto API
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: x86/crc-t10dif - convert to static call library API
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] random: fix the RNDRESEEDCRNG ioctl
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 7/7] crypto: powerpc/crc-t10dif - convert to static call API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 5/7] crypto: arm/crc-t10dif - convert to static call library API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/7] crypto: arm64/crc-t10dif - convert to static call API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 4/7] crypto: x86/crc-t10dif - convert to static call library API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 3/7] crypto: generic/crc-t10dif - expose both arch and generic shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/7] crypto: lib/crc-t10dif - add static call support for optimized versions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 1/7] crypto: crc-t10dif - turn library wrapper for shash into generic library
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 0/7] crypto: switch to static calls for CRC-T10DIF
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 2/3] x86/cpu: Set low performance CRC32C flag on some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: KMSAN: uninit-value in __crypto_memneq (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KMSAN: uninit-value in __crypto_memneq (2)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- KMSAN: uninit-value in __crypto_memneq (2)
- From: syzbot <syzbot+e0f501056b282add58a6@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.11
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: testmgr - add NIAP FPT_TST_EXT.1 subset of tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: testmgr - add NIAP FPT_TST_EXT.1 subset of tests
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [PATCH v2] crypto: reduce minimum alignment of on-stack structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] drivers: crypto: qce: sha: Restore/save sha1_state/sha256_state with qce_sha_reqctx in export/import
- From: Thara Gopinath <thara.gopinath@xxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: drivers/char/random.c needs a (new) maintainer
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 05/10] dma: tx49 removal
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham - Fix link error without crypto-engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: x86/aes-ni-xts - recover and improve performance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Fix divide error in do_xor_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Fix divide error in do_xor_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: add RFC5869 HKDF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/5] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 05/10] dma: tx49 removal
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/3] x86/cpu: Set low performance CRC32C flag on some Zhaoxin CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 5/6] crypto: hisilicon/hpre - add 'ECDH' algorithm
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: problem with ccp-crypto module on apu
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <apais@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto - shash: reduce minimum alignment of shash_desc structure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Emil Renner Berthing <emil.renner.berthing@xxxxxxxxx>
- [PATCH v2 19/19] crypto: octeontx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 16/19] crypto: rockchip: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 18/19] crypto: talitos: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 17/19] crypto: s5p: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 15/19] crypto: qce: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 14/19] crypto: qat: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 11/19] crypto: mediatek: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 13/19] crypto: picoxcell: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 12/19] crypto: omap: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 10/19] crypto: ixp4xx: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 09/19] crypto: img-hash: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 07/19] crypto: ccree: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 08/19] crypto: hifn_795x: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 06/19] crypto: ccp: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 05/19] crypto: cavium: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 04/19] crypto: caam: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 03/19] crypto: axis: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 02/19] crypto: atmel: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 01/19] crypto: amcc: convert tasklets to use new tasklet_setup() API
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v2 00/19]crypto: convert tasklets to use new tasklet_setup API()
- From: Allen Pais <allen.lkml@xxxxxxxxx>
- [PATCH v6 6/6] crypto: hisilicon/hpre - add 'CURVE25519' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 5/6] crypto: hisilicon/hpre - add 'ECDH' algorithm
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 3/6] crypto: hisilicon/hpre - add algorithm type
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 2/6] crypto: hisilicon/hpre - add some updates to adapt to Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 0/6] add ECDH and CURVE25519 algorithms support for Kunpeng 930
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 4/6] crypto: expose elliptic curve parameters as Crypto APIs
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- [PATCH v6 1/6] crypto: hisilicon/hpre - add version adapt to new algorithms
- From: Meng Yu <yumeng18@xxxxxxxxxx>
- Re: [PATCH] X.509: Fix crash caused by NULL pointer
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] X.509: Fix crash caused by NULL pointer
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: Null pointer dereference in public key verification (related to SM2 introduction)
- From: Jean-Louis Dupond <jean-louis@xxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: Null pointer dereference in public key verification (related to SM2 introduction)
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: add RFC5869 HKDF
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 5/5] fs: use HKDF implementation from kernel crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Null pointer dereference in public key verification (related to SM2 introduction)
- From: Tee Hao Wei <angelsl@xxxxxxx>
- Re: [PATCH 3/5] crypto: add RFC5869 HKDF
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/5] fs: use HKDF implementation from kernel crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/5] Add KDF implementations to crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/5] Add KDF implementations to crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/5] Add KDF implementations to crypto API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: x86/crc32c-intel - Don't match some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH] crypto: x86/crc32c-intel - Don't match some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v1 3/3] crypto: x86/crc32c-intel Exclude low performance CRC32C instruction CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v1 2/3] x86/cpu: Set low performance CRC32C flag on some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v1 1/3] x86/cpufeatures: Add low performance CRC32C instruction CPU feature
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v1 0/3] crypto: x86/crc32c-intel - Exclude some Zhaoxin CPUs
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Atsushi Nemoto <anemo@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 05/10] dma: tx49 removal
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Atsushi Nemoto <anemo@xxxxxxxxxxxxx>
- [PATCH] crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
- From: Daniele Alessandrelli <daniele.alessandrelli@xxxxxxxxxxxxxxx>
- Re: (subset) [PATCH 00/10] Remove support for TX49xx
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] crypto: keembay-ocs-hcu - Fix a WARN() message
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- [PATCH 9/9] crypto: octeontx2: register with linux crypto framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 8/9] crypto: octeontx2: add support to process the crypto request
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 7/9] crypto: octeontx2: add virtual function driver support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 6/9] crypto: octeontx2: add support to get engine capabilities
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 5/9] crypto: octeontx2: add LF framework
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 4/9] crypto: octeontx2: load microcode and create engine groups
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 3/9] crypto: octeontx2: enable SR-IOV and mailbox communication with VF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 2/9] crypto: octeontx2: add mailbox communication with AF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 1/9] drivers: crypto: add Marvell OcteonTX2 CPT PF driver
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 0/9] Add Support for Marvell OcteonTX2 CPT engine
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH] crypto: keembay-ocs-hcu - Fix a WARN() message
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 00/10] Remove support for TX49xx
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 05/10] dma: tx49 removal
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v2] crypto: Fix divide error in do_xor_speed()
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- [PATCH v2 20/21] crypto: x86 - remove glue helper module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 16/21] crypto: x86/serpent - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 17/21] crypto: x86/cast5 - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 21/21] crypto: x86 - use local headers for x86 specific shared declarations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 15/21] crypto: x86/camellia - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 19/21] crypto: x86/twofish - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 18/21] crypto: x86/cast6 - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 13/21] crypto: x86/blowfish - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 14/21] crypto: x86 - add some helper macros for ECB and CBC modes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 11/21] crypto: x86/glue-helper - drop CTR helper routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 12/21] crypto: x86/des - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 10/21] crypto: x86/twofish - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 09/21] crypto: x86/cast6 - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 07/21] crypto: x86/serpent - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 08/21] crypto: x86/cast5 - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 05/21] crypto: x86/glue-helper - drop XTS helper routines
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 03/21] crypto: x86/serpent- switch to XTS template
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 06/21] crypto: x86/camellia - drop CTR mode implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 04/21] crypto: x86/twofish - switch to XTS template
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 01/21] crypto: x86/camellia - switch to XTS template
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 02/21] crypto: x86/cast6 - switch to XTS template
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 00/21] crypto: x86 - remove glue helper module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: (subset) [PATCH 00/10] Remove support for TX49xx
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 01/10] MIPS: TX49xx: Drop support
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 06/10] mtd: Remove drivers used by TX49xx
- From: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
- [PATCH 07/10] char: hw_random: Remove tx4939 driver
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 10/10] ASoC: txx9: Remove driver
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 06/10] mtd: Remove drivers used by TX49xx
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 09/10] ide: tx4938ide: Remove driver
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 05/10] dma: tx49 removal
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 08/10] rtc: tx4939: Remove driver
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 01/10] MIPS: TX49xx: Drop support
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 03/10] net: 8390: Drop support for TX49XX boards
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 00/10] Remove support for TX49xx
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 04/10] spi: txx9: Remove driver
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 02/10] net: tc35815: Drop support for TX49XX boards
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Rename struct device_private to bcm_device_private
- From: Qais Yousef <qais.yousef@xxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] drivers: crypto: marvell: Fix a spelling s/fautly/faultly/ in comment
- From: Bhaskar Chowdhury <unixbhaskar@xxxxxxxxx>
- Testmgr: invalid lock context
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon - register device to uacce
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon/sec - register SEC device to uacce
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon/hpre - register HPRE device to uacce
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon - add ZIP device using mode parameter
- From: Kai Ye <yekai13@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
- From: Kai Ye <yekai13@xxxxxxxxxx>
- Re: [BISECTED REGRESSION] v5.10 stalles on assoication with a wpa2 802.11 ap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Rename struct device_private to bcm_device_private
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- Re: [PATCH 0/5] Add KDF implementations to crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/5] crypto: Add key derivation self-test support code
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/5] Add KDF implementations to crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/5] crypto: add SP800-108 counter key derivation function
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 3/5] crypto: add RFC5869 HKDF
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 4/5] security: DH - use KDF implementation from crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 5/5] fs: use HKDF implementation from kernel crypto API
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [BISECTED REGRESSION] v5.10 stalles on assoication with a wpa2 802.11 ap
- From: Carl Philipp Klemm <philipp@xxxxxxxx>
- Re: [PATCH] random: initialize ChaCha20 constants with correct endianness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] random: remove dead code left over from blocking pool
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] random: fix the RNDRESEEDCRNG ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: qat - reduce size of mapped region
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 2/3] crypto: qat - change format string and cast ring size
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/3] crypto: qat - fix potential spectre issue
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 0/3] crypto: qat - fix issues reported by smatch
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - configure arbiter mapping based on engines enabled
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 0/4] Remove PicoXcell
- From: Rob Herring <robh@xxxxxxxxxx>
- Re[2]: problem with ccp-crypto module on apu
- From: "Domen Stangar" <domen.stangar@xxxxxxxxx>
- [PATCH v2 3/5] crypto: x86/gcm-aes-ni - clean up mapping of associated data
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: x86/gcm-aes-ni - replace function pointers with static branches
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: x86/gcm-aes-ni - refactor scatterlist processing
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: x86/gcm-aes-ni - drop unused asm prototypes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: x86/gcm-aes-ni - prevent misaligned buffers on the stack
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: gcm-aes-ni cleanups
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] KVM/SVM: add support for SEV attestation command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- RE: [PATCH] crypto: qat - add CRYPTO_AES to Kconfig dependencies
- From: "Chiappero, Marco" <marco.chiappero@xxxxxxxxx>
- [PATCH] crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
- From: Marco Chiappero <marco.chiappero@xxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: problem with ccp-crypto module on apu
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 3/5] crypto: expose elliptic curve parameters as Crypto APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] crypto: Add Keem Bay OCS HCU driver
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v5 3/5] crypto: expose elliptic curve parameters as Crypto APIs
- From: "Alessandrelli, Daniele" <daniele.alessandrelli@xxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: hisilicon - enable new algorithms of SEC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/5] crypto: expose elliptic curve parameters as Crypto APIs
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: hisilicon - enable new algorithms of SEC
- From: liulongfang <liulongfang@xxxxxxxxxx>
- RE: [RFC PATCH 0/6] Keem Bay OCS ECC crypto driver
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- crypto: stm32 - Fix last sparse warning in stm32_cryp_check_ctr_counter
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [kbuild-all] Re: [PATCH v2 2/2] crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
- From: "Chen, Rong A" <rong.a.chen@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: omap-sham - Fix link error without crypto-engine
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: Loss of performance in RDRAND and RDSEED?
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Loss of performance in RDRAND and RDSEED?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- INFO: task hung in virtio_cleanup
- From: syzbot <syzbot+1db88381b64aaa929ef6@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecdh - avoid buffer overflow in ecdh_set_secret()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/14] crypto: arm32-optimized BLAKE2b and BLAKE2s
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: ingenic - Fix a resource leak in an error handling path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: iproc-rng200: Move enable/disable in separate function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] hwrng: iproc-rng200: Fix disable of the block.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: arm64/aes-ctr - improve tail handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm64/aes-ce - really hide slower algos when faster ones are enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] crypto: Add Keem Bay OCS HCU driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] crypto: sun4i-ss: prevent always fallback for ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm/chacha-neon - add missing counter increment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: remove bare cipher from public API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - fix platform_get_irq.cocci warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - remove unused including <linux/version.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: Remove PicoXcell driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sahara - Remove unused .id_table support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: crypto: s5p-sss: drop Kamil Konieczny
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - avoid signed overflow in byte count
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: aes-ni - implement support for cts(cbc(aes))
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mediatek - remove obsolete driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: vmx - Move extern declarations into header file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/5] crypto: expose elliptic curve parameters as Crypto APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] drivers: crypto: qce: sha: Restore/save sha1_state/sha256_state with qce_sha_reqctx in export/import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: fix khwrng lifecycle
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/crc32c-intel - Don't match some Zhaoxin CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: hisilicon - enable new algorithms of SEC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ecdh - avoid buffer overflow in ecdh_set_secret()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 20/21] crypto: x86 - remove glue helper module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 21/21] crypto: x86 - use local headers for x86 specific shared declarations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 20/21] crypto: x86 - remove glue helper module
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 19/21] crypto: x86/twofish - drop dependency on glue helper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 18/21] crypto: x86/cast6 - drop dependency on glue helper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 17/21] crypto: x86/cast5 - drop dependency on glue helper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 16/21] crypto: x86/serpent - drop dependency on glue helper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 15/21] crypto: x86/camellia - drop dependency on glue helper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 14/21] crypto: x86 - add some helper macros for ECB and CBC modes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 13/21] crypto: x86/blowfish - drop CTR mode implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 12/21] crypto: x86/des - drop CTR mode implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 08/21] crypto: x86/cast5 - drop CTR mode implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/21] crypto: x86 - remove glue helper module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 16/21] crypto: x86/serpent - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 18/21] crypto: x86/cast6 - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 21/21] crypto: x86 - use local headers for x86 specific shared declarations
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 19/21] crypto: x86/twofish - drop dependency on glue helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]