Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] padata: add a reviewer
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] ARM: dts: sun8i: v3s: Enable crypto engine
- From: Martin Cerveny <m.cerveny@xxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/x86: Use XORL r32,32 in poly1305-x86_64-cryptogams.pl
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/x86: Use XORL r32,32 in curve25519-x86_64.c
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- [SOLVED] Re: PROBLEM: SHA1 on Allwinner V3s failed
- From: Martin Cerveny <martin@xxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2] crypto: sun8i-ss - remove redundant memzero_explicit()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: inside-secure - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: amlogic - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: sun8i-ss - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: sun8i-ce - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- RE: [PATCH] hwrng: cctrn - Simplify with dev_err_probe()
- From: Hadar Gat <Hadar.Gat@xxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - remove redundant memzero_explicit()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: lib/crypto/chacha.c:65:1: warning: the frame size of 1604 bytes is larger than 1024 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - remove redundant memzero_explicit()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: sun8i-ss - remove redundant memzero_explicit()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [v2 PATCH] crypto: af_alg - Work around empty control messages without MSG_MORE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [v2 PATCH] crypto: af_alg - Work around empty control messages without MSG_MORE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: sun8i-ss - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v2 2/4] crypto: amlogic - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v2 3/4] crypto: sun8i-ce - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v2 1/4] crypto: inside-secure - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v2 0/4] crypto: use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH] padata: add a reviewer
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: sa2ul - Hide pointer and fix -Wpointer-to-int-cast in dev_dbg()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccree - Simplify with dev_err_probe()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 2/3] crypto: sa2ul - Simplify with dev_err_probe()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH] hwrng: cctrn - Simplify with dev_err_probe()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] padata: add a reviewer
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - Work around empty control messages without MSG_MORE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: caam/qi - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: af_alg - Work around empty control messages without MSG_MORE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - use kfree_sensitive()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ss - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: sun8i-ce - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH] crypto: sun8i-ss - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH] crypto: amlogic - use kfree_sensitive()
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: amlogic - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH] crypto: inside-secure - use kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: PROBLEM: SHA1 on Allwinner V3s failed
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: PROBLEM: SHA1 on Allwinner V3s failed
- From: Martin Cerveny <martin@xxxxxxxxx>
- Re: [PATCH 5/6] crypto: ahash - Remove AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: PROBLEM: SHA1 on Allwinner V3s failed
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH RESEND 04/10] crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- PROBLEM: SHA1 on Allwinner V3s failed
- From: Martin Cerveny <martin@xxxxxxxxx>
- Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sa2ul: fix compiler warning produced by clang
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: rng: add bindings for Xiphera XIP8001B hwnrg
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: arm64/gcm - Fix endianness warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - Add declarations for assembly variables
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Andrew Lunn <andrew@xxxxxxx>
- [PATCH 1/2] dt-bindings: crypto: sa2ul: fix a DT binding check warning
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 0/2] crypto: sa2ul: couple of fixes
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 2/2] crypto: sa2ul: fix compiler warning produced by clang
- From: Tero Kristo <t-kristo@xxxxxx>
- RE: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v34 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/poly1305 - Add prototype for poly1305_blocks_neon
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - include <linux/scatterlist.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: powerpc/crc-vpmsum_test - Fix sparse endianness warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64/sha - Add declarations for assembly variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64/gcm - Fix endianness warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm/poly1305 - Add prototype for poly1305_blocks_neon
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: stm32/crc32 - include <linux/io.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - include <linux/scatterlist.h>
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: HMAC test fails for big key using libkcapi
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- RE: [PATCH] crypto: mediatek - Fix endianness bugs and sparse warnings
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: HMAC test fails for big key using libkcapi
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/curve25519 - include <linux/scatterlist.h>
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- HMAC test fails for big key using libkcapi
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH] crypto: arm/curve25519 - include <linux/scatterlist.h>
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/2] crypto: stm32/hash - include <linux/dma-mapping.h>
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/2] crypto: stm32/crc32 - include <linux/io.h>
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 5/7] crypto: bcm-iproc - remove ecb(arc4) support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 7/7] crypto: arc4 - mark ecb(arc4) skcipher as obsolete
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] crypto: arc4 - mark ecb(arc4) skcipher as obsolete
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 6/7] net: wireless: drop bogus CRYPTO_xxx Kconfig selects
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: arc4 - mark ecb(arc4) skcipher as obsolete
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 3/7] SUNRPC: remove RC4-HMAC-MD5 support from KerberosV
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/7] staging/rtl8192u: switch to RC4 library interface
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: n2 - remove ecb(arc4) support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/7] staging/rtl8192e: switch to RC4 library interface
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: mark ecb(arc4) skcipher as obsolete
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCHv6 2/7] crypto: sa2ul: Add crypto driver
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 6/6] crypto: cmac - Use cbc skcipher instead of raw cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] crypto: cmac - Use cbc skcipher instead of raw cipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- [PATCH] crypto/chtls: Fix double free in chtls_pass_accept_request()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [PATCH RESEND 04/10] crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH RESEND 05/10] crypto: hisilicon/zip - use a enum parameter instead of some macros
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 08/10] crypto: hisilicon/zip - move some private macros from 'zip.h' to 'zip_crypto.c'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 02/10] crypto: hisilicon/zip - unify naming style for functions and macros
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 07/10] crypto: hisilicon/zip - fix static check warning
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 06/10] crypto: hisilicon/zip - add print for error branch
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 10/10] crypto: hisilicon/zip - fix some coding styles
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 04/10] crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 09/10] crypto: hisilicon/zip - supplement some comments
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 03/10] crypto: hisilicon/zip - modify debugfs interface parameters
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 01/10] crypto: hisilicon/zip - remove some useless parameters
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH RESEND 00/10] crypto: hisilicon/zip - misc clean up
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- Re: [PATCH] Add missing bound checks for software 842 decompressor
- From: Joan Bruguera <joanbrugueram@xxxxxxxxx>
- Re: [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH] crypto: qat - aead cipher length should be block multiple
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: qat - aead cipher length should be block multiple
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCHv6 2/7] crypto: sa2ul: Add crypto driver
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: stm32 - Fix sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/18] crypto: sun8i-ss: Add more comment on some structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 02/18] crypto: sun8i-ss: Add support for the PRNG
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 06/18] crypto: sun8i-ss: better debug printing
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 11/18] crypto: sun8i-ce: rename has_t_dlen_in_bytes to cipher_t_dlen_in_bytes
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 13/18] crypto: sun8i-ce: Add stat_bytes debugfs
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 12/18] crypto: sun8i-ce: support hash algorithms
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 14/18] crypto: sun8i-ce: Add support for the PRNG
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 18/18] crypto: sun8i-ce: fix some style issue
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 15/18] crypto: sun8i-ce: Add support for the TRNG
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 16/18] crypto: sun8i-ce: fix comparison of integer expressions of different signedness
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 17/18] crypto: sun8i-ss: fix comparison of integer expressions of different signedness
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 08/18] crypto: sun8i-ce: move iv data to request context
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 10/18] crypto: sun8i-ce: handle different error registers
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 09/18] crypto: sun8i-ce: split into prepare/run/unprepare
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 07/18] crypto: sun8i-ce: handle endianness of t_common_ctl
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 04/18] crypto: sun8i-ss: fix a trivial typo
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 03/18] crypto: sun8i-ss: support hash algorithms
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 01/18] crypto: sun8i-ss: Add SS_START define
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 00/18] crypto: allwinner: add xRNG and hashes
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [cryptodev:master 2/35] drivers/crypto/stm32/stm32-crc32.c:128:2: error: implicit declaration of function 'writel_relaxed'
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: stm32 - Add missing header inclusions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [build break] aegis128-neon-inner.c fails to build on v5.9-rc1
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: ccree - fix runtime PM imbalance on error
- From: dinghao.liu@xxxxxxxxxx
- Re: [PATCH] crypto: ccree - fix runtime PM imbalance on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/10] crypto: hisilicon/qm - misc fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio - don't use 'default m'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: picoxcell_crypto: Fix potential race condition bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Cyrpto: Clean up kmap() use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng : cleanup initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/2] hwrng: optee: handle unlimited data rates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: sa2ul: add Kconfig selects to fix build error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/x86: Use CRC32 mnemonic in crc32c-intel_glue.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Remove none supported ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: delete or fix duplicated words
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add delay before polling mailbox
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x - switch from 'pci_' to 'dma_' API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: mediatek - Fix endianness bugs and sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/17] crypto: sun8i-ce: move iv data to request context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/17] crypto: sun8i-ce: move iv data to request context
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Fwd: Re: Could You please send us hosting comparison website?
- From: John <info@xxxxxxxxxxxxxxx>
- Re: [LTP] [LTP PATCH 0/2] ltp: fix af_alg02 to specify control data
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v33 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: hifn_795x - Remove 64-bit build-time check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: af_alg - add extra parameters for DRBG interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [build break] aegis128-neon-inner.c fails to build on v5.9-rc1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - allocate a one page buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox: add an error message to explain the failure of pci_request_mem_regions
- From: George Acosta <acostag.ubuntu@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg: check blocklen is non zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [LTP PATCH 2/2] crypto/af_alg02: send message with control data before reading
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [LTP PATCH 1/2] lib/tst_af_alg: add tst_alg_sendmsg()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [LTP PATCH 0/2] ltp: fix af_alg02 to specify control data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 3/3] hwrng: xiphera-trng: add support for XIP8001B hwrng
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] hwrng: xiphera-trng: fix platform_no_drv_owner.cocci warnings
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg: check blocklen is non zero
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: rng: add bindings for Xiphera XIP8001B hwnrg
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH v2 3/3] hwrng: xiphera-trng: add support for XIP8001B hwrng
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: rng: add bindings for Xiphera XIP8001B hwnrg
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH v2 0/3] hwrng: add support for Xiphera XIP8001B
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH v32 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: drbg: check blocklen is non zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] lib: Verify array index is correct before using it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] crypto: caam/qi2 - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 6/9] crypto: caam/qi2 - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 4/9] crypto: caam/jr - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 5/9] crypto: caam/qi - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 4/9] crypto: caam/jr - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: caam/qi - add support for more XTS key lengths
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH RESEND 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: rng: add bindings for Xiphera XIP8001B hwnrg
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] Add missing bound checks for software 842 decompressor
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] Cyrpto: Clean up kmap() use
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- [RESEND PATCH] KEYS: asymmetric: Fix kerneldoc
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] ARM: multi_v7_defconfig: enable caam crypto module
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- [PATCH 0/3] hwrng: add support for Xiphera XIP8001B
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH 1/3] dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH 2/3] dt-bindings: rng: add bindings for Xiphera XIP8001B hwnrg
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [PATCH 3/3] hwrng: xiphera-trng: add support for XIP8001B hwrng
- From: Atte Tommiska <atte.tommiska@xxxxxxxxxxx>
- [v3 PATCH] crypto: algapi - Remove skbuff.h inclusion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next] crypto: sa2ul - Fix pointer-to-int-cast warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6] mm/zswap: move to use crypto_acomp API for hardware acceleration
- From: Barry Song <song.bao.hua@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 6/6] crypto: cmac - Use cbc skcipher instead of raw cipher
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: ahash - Remove AHASH_REQUEST_ON_STACK
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: ahash - Add ahash_alg_instance
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: ahash - Add init_tfm/exit_tfm
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: ahash - Add helper to free single spawn instance
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: skcipher - Add helpers for sync skcipher spawn
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] crypto: Implement cmac based on cbc skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Remove unneeded variable t1
- From: Xu Wang <vulab@xxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: Convert i.MX to json-schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: crypto: Convert i.MX sahara to json-schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: Convert i.MX SCC to json-schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: crypto: Convert MXS DCP to json-schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 0/5] hwrng: add support for i.MX6 rngb
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- RE: Information required on how to provide reseed input to DRBG
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH v5 05/10] crypto: hisilicon/qm - fix event queue depth to 2048
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 07/10] crypto: hisilicon/qm - fix VF not available after PF FLR
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 00/10] crypto: hisilicon/qm - misc fixes
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 10/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 04/10] crypto: hisilicon/qm - fix judgement of queue is full
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 01/10] crypto: hisilicon/qm - fix wrong release after using strsep
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 03/10] crypto: hisilicon/qm - fix print frequence in hisi_qp_send
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 06/10] crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 09/10] crypto: hisilicon/qm - fix the call trace when unbind device
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 02/10] crypto: hisilicon/qm - clear used reference count when start qp
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v5 08/10] crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: Information required on how to provide reseed input to DRBG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.9
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: af_alg - add extra parameters for DRBG interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH 1/1] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- RE: Information required on how to provide reseed input to DRBG
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: Information required on how to provide reseed input to DRBG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] drivers: crypto: picoxcell_crypto: Fix potential race condition bug
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Information required on how to provide reseed input to DRBG
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH v2] crypto: algif_aead - fix uninitialized ctx->init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] drivers: crypto: add the Virtual Function driver for OcteonTX2 CPT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: virtio - don't use 'default m'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCHv1 2/2] crypto: add Intel SoCFPGA crypto service driver
- From: Richard Gong <richard.gong@xxxxxxxxxxxxxxx>
- [PATCH v2] crypto: algif_aead - fix uninitialized ctx->init
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - fix uninitialized ctx->init
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH] crypto: af_alg - fix uninitialized ctx->init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH] crypto: af_alg - fix uninitialized ctx->init
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv1 2/2] crypto: add Intel SoCFPGA crypto service driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH RESEND 4/9] crypto: caam/jr - add support for more XTS key lengths
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCHv1 2/2] crypto: add Intel SoCFPGA crypto service driver
- From: richard.gong@xxxxxxxxxxxxxxx
- [PATCHv1 1/2] firmware: stratix10-svc: extend svc to support new crypto features
- From: richard.gong@xxxxxxxxxxxxxxx
- [PATCHv1 0/2] add Intel SoCFPGA crypto service driver
- From: richard.gong@xxxxxxxxxxxxxxx
- [PATCH] drivers: crypto: picoxcell_crypto: Fix potential race condition bug
- From: madhuparnabhowmik10@xxxxxxxxx
- Re: [v3 PATCH 19/31] crypto: caam - Remove rfc3686 implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 19/31] crypto: caam - Remove rfc3686 implementations
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [v3 PATCH 19/31] crypto: caam - Remove rfc3686 implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 10/31] crypto: chacha-generic - Add support for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: Remove unused async iterators
- From: ira.weiny@xxxxxxxxx
- [PATCH 1/2] crypto/ux500: Fix kmap() bug
- From: ira.weiny@xxxxxxxxx
- [PATCH 0/2] Cyrpto: Clean up kmap() use
- From: ira.weiny@xxxxxxxxx
- RE: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- [PATCH AUTOSEL 5.8 11/64] crypto: aesni - Fix build with LLVM_IAS=1
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.8 63/64] crypto: caam - silence .setkey in case of bad key length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.7 59/60] crypto: caam - silence .setkey in case of bad key length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 08/45] crypto: aesni - Fix build with LLVM_IAS=1
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 08/31] crypto: aesni - Fix build with LLVM_IAS=1
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.7 11/60] crypto: aesni - Fix build with LLVM_IAS=1
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v3 PATCH 19/31] crypto: caam - Remove rfc3686 implementations
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Scott Dial <scott@xxxxxxxxxxxxx>
- Re: [v3 PATCH 16/31] crypto: caam/qi2 - Set final_chunksize on chacha
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [v3 PATCH 10/31] crypto: chacha-generic - Add support for chaining
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Severe performance regression in "net: macsec: preserve ingress frame ordering"
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- RE: [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Announce loop-AES-v3.7r file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- [PATCH] hwrng : cleanup initialization
- [PATCH AUTOSEL 5.8 19/72] crypto: ccree - fix resource leak on error path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.8 26/72] crypto: qat - allow xts requests not multiple of block
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.8 44/72] crypto: x86/crc32c - fix building with clang ias
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.7 23/58] crypto: qat - allow xts requests not multiple of block
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 09/21] crypto: ccree - fix resource leak on error path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 11/40] crypto: ccree - fix resource leak on error path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.7 16/58] crypto: ccree - fix resource leak on error path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH 25/26] net: pass a sockptr_t into ->setsockopt
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 16/22] crypto: ccree - add check for xts input length equal to zero
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Add Support for Marvell OcteonTX2 Cryptographic
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 25/26] net: pass a sockptr_t into ->setsockopt
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 21/22] crypto: qce - add check for xts input length equal to zero
- From: Stanimir Varbanov <svarbanov@xxxxxxxxxx>
- Re: [PATCH 10/22] crypto: atmel-aes - add check for xts input length equal to zero
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [crypto:master 164/167] drivers/char/hw_random/ingenic-rng.c:118:1-6: WARNING: invalid free of devm_ allocated data (fwd)
- From: Zhou Yanjie <zhouyanjie@xxxxxxxxxxxxxx>
- [PATCH 01/22] crypto: arm/aes-ce - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 13/22] crypto: cavium/cpt - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 16/22] crypto: ccree - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 12/22] crypto: bcm - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 14/22] crypto: cavium/nitrox - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 19/22] crypto: inside-secure - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 17/22] crypto: chelsio - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 15/22] crypto: ccp - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 21/22] crypto: qce - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 22/22] crypto: vmx - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 20/22] crypto: octeontx - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 18/22] crypto: hisilicon/sec - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 08/22] crypto: x86/glue_helper - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 10/22] crypto: atmel-aes - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 11/22] crypto: artpec6 - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 09/22] crypto: xts - add check for block length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 07/22] crypto: s390/paes - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 06/22] crypto: s390/aes - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 05/22] crypto: powerpc/aes-spe - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 04/22] crypto: arm64/aes-neonbs - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 03/22] crypto: arm64/aes - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 02/22] crypto: arm/aes-neonbs - add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 00/22] crypto: add check for xts input length equal to zero
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- Re: [PATCH] crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc
- From: Zhou Yanjie <zhouyanjie@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v2 2/3] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 3/3] drivers: crypto: add the Virtual Function driver for OcteonTX2 CPT
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 1/3] octeontx2-af: add support to manage the CPT unit
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v2 0/3] Add Support for Marvell OcteonTX2 Cryptographic
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- RE: [PATCH 25/26] net: pass a sockptr_t into ->setsockopt
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [v4 01/10] crypto: hisilicon/qm - fix wrong release after using strsep
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH 25/26] net: pass a sockptr_t into ->setsockopt
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [v3 PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] crypto: hisilicon: accessing the data mapped to streaming DMA
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH 25/26] net: pass a sockptr_t into ->setsockopt
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [v3 PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 21/31] crypto: ccp - Remove rfc3686 implementation
- From: John Allen <john.allen@xxxxxxx>
- [v3 PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND 0/9] crypto: caam - xts(aes) updates
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 6/9] crypto: caam/qi2 - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 4/9] crypto: caam/jr - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 8/9] crypto: caam/qi - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- Re: [PATCH -next] crypto: sa2ul: add Kconfig selects to fix build error
- From: "J, KEERTHY" <j-keerthy@xxxxxx>
- [PATCH -next] crypto: sa2ul: add Kconfig selects to fix build error
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 6/9] crypto: caam/qi2 - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 9/9] crypto: caam/qi2 - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 4/9] crypto: caam/jr - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 5/9] crypto: caam/qi - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 3/9] crypto: caam/qi2 - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 8/9] crypto: caam/qi - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 7/9] crypto: caam/jr - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 9/9] crypto: caam/qi2 - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH] hwrng: core - allocate a one page buffer
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 0/9] crypto: caam - xts(aes) updates
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 5/9] crypto: caam/qi - add support for more XTS key lengths
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 1/9] crypto: caam/jr - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH RESEND 7/9] crypto: caam/jr - add support for XTS with 16B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCH 2/9] crypto: caam/qi - add fallback for XTS with more than 8B IV
- From: Andrei Botila <andrei.botila@xxxxxxxxxxx>
- [PATCHv3 2/2] hwrng: optee: fix wait use case
- From: Jorge Ramirez-Ortiz <jorge@xxxxxxxxxxxx>
- [PATCHv3 1/2] hwrng: optee: handle unlimited data rates
- From: Jorge Ramirez-Ortiz <jorge@xxxxxxxxxxxx>
- [PATCHv3 2/2] hwrng: optee: fix wait use case
- From: Jorge Ramirez-Ortiz <jorge@xxxxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [v4 01/10] crypto: hisilicon/qm - fix wrong release after using strsep
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- [PATCH] crypto/x86: Use CRC32 mnemonic in crc32c-intel_glue.c
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v3 32/38] virtio_crypto: convert to LE accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v3 08/38] virtio_crypto: correct tags for config space fields
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- [PATCH v2] crypto/x86: Use CRC32 mnemonic in crc32c-intel_glue.c
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- [PATCH] dt-bindings: rng: Convert i.MX to json-schema
- From: Anson Huang <Anson.Huang@xxxxxxx>
- [PATCH 1/2] crypto: ccree: remove data unit size support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ccree: remove bitlocker cipher
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/2] Remove none supported ciphers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] tcrypt: Add support for hash speed testing with keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] dt-bindings: crypto: Convert i.MX sahara to json-schema
- From: Anson Huang <Anson.Huang@xxxxxxx>
- [PATCH 2/3] dt-bindings: crypto: Convert i.MX SCC to json-schema
- From: Anson Huang <Anson.Huang@xxxxxxx>
- [PATCH 1/3] dt-bindings: crypto: Convert MXS DCP to json-schema
- From: Anson Huang <Anson.Huang@xxxxxxx>
- Re: [PATCH v4 01/10] crypto: hisilicon/qm - fix wrong release after using strsep
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 08/24] virtio_crypto: correct tags for config space fields
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v4 01/10] crypto: hisilicon/qm - fix wrong release after using strsep
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 07/10] crypto: hisilicon/qm - fix VF not available after PF FLR
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 10/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 03/10] crypto: hisilicon/qm - fix print frequence in hisi_qp_send
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 04/10] crypto: hisilicon/qm - fix judgement of queue is full
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 00/10] crypto: hisilicon/qm - misc fixes
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 08/10] crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 09/10] crypto: hisilicon/qm - fix the call trace when unbind device
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 05/10] crypto: hisilicon/qm - fix event queue depth to 2048
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 02/10] crypto: hisilicon/qm - clear used reference count when start qp
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- [PATCH v4 06/10] crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop'
- From: Yang Shen <shenyang39@xxxxxxxxxx>
- Re: [RFC PATCH 4/7] crypto: remove ARC4 support from the skcipher API
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] crypto: x86/aesni - implement accelerated CBCMAC ahash
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree - Delete non-standard algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - Delete non-standard algorithms
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: sa2ul - fix pointer cast warning on 32-bit
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Liwei Song <liwei.song@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Liwei Song <liwei.song@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Liwei Song <liwei.song@xxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: manual merge of the crypto tree with the jc_docs tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: linux-next: manual merge of the tip tree with the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: linux-next: manual merge of the akpm-current tree with the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v2 08/24] virtio_crypto: correct tags for config space fields
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 5.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [crypto:master 164/167] drivers/char/hw_random/ingenic-rng.c:118:1-6: WARNING: invalid free of devm_ allocated data (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [PATCH] crypto: ccp - zero the cmd data after use it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - zero the cmd data after use it
- From: Liwei Song <liwei.song@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- XFRM tunnel issue.
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [GIT PULL] Crypto Update for 5.9
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] crypto: hisilicon: accessing the data mapped to streaming DMA
- From: Jia-Ju Bai <baijiaju@xxxxxxxxxxxxxxx>
- Re: [BUG] crypto: hisilicon: accessing the data mapped to streaming DMA
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: drbg: check blocklen is non zero
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Saheed Bolarinwa <refactormyself@xxxxxxxxx>
- [PATCH] crypto: drbg: check blocklen is non zero
- [PATCH] crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Tom Rix <trix@xxxxxxxxxx>
- [BUG] crypto: hisilicon: accessing the data mapped to streaming DMA
- From: Jia-Ju Bai <baijiaju@xxxxxxxxxxxxxxx>
- [BUG] crypto: qat: accessing the data mapped to streaming DMA
- From: Jia-Ju Bai <baijiaju@xxxxxxxxxxxxxxx>
- [PATCH] crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- RE: [RESEND PATCH v5] mm/zswap: move to use crypto_acomp API for hardware acceleration
- From: "Song Bao Hua (Barry Song)" <song.bao.hua@xxxxxxxxxxxxx>
- [PATCH] crypto: x86/aesni - implement accelerated CBCMAC, CMAC and XCBC shashes
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: Borislav Petkov <bp@xxxxxxxxx>
- [v2 PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 04/17] hwrng: Drop uses of pci_read_config_*() return value
- From: "Saheed O. Bolarinwa" <refactormyself@xxxxxxxxx>
- [RFC PATCH 00/17] Drop uses of pci_read_config_*() return value
- From: "Saheed O. Bolarinwa" <refactormyself@xxxxxxxxx>
- Re: [PATCHv6 1/7] dt-bindings: crypto: Add TI SA2UL crypto accelerator documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH][next] crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Fix sparse warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core: remove redundant initialization of variable ret
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Add support for the RNG in Ingenic JZ4780 and X1000.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: sp-pci: use generic power management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: caam - updates for 5.9
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1 v3] inside-secure irq balance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Replace memcpy() invocation with simple assignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1 v3] marvell cesa irq balance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] DH: SP800-56A rev 3 compliant validation checks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: hisilicon/zip - misc bugfix
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH v3 08/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: hisilicon/zip - misc bugfix
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/17] crypto: sun8i-ce: move iv data to request context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: hisilicon/zip - modify debugfs interface parameters
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH v3 08/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: "shenyang (M)" <shenyang39@xxxxxxxxxx>
- Re: [PATCH 03/10] crypto: hisilicon/zip - modify debugfs interface parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] crypto: hisilicon/qm - fix the process of register algorithms to crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: sa2ul - fix wrong pointer passed to PTR_ERR()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: af_alg - add extra parameters for DRBG interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algif_aead - Do not set MAY_BACKLOG on the async path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algif_skcipher - EBUSY on aio should be an error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: crypto_engine: delete duplicated word
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: asymmetric_keys: pkcs7_parser: delete duplicated word
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/6] crypto: algif_aead: delete duplicated word
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt: delete duplicated words in messages
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: crct10dif_generic: fix duplicated words
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: crc32c_generic: delete and fix duplicated words
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: delete or fix duplicated words
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: crypto: aegis128: error: incompatible types when initializing type 'unsigned char' using type 'uint8x16_t'
- From: Andrea Righi <andrea.righi@xxxxxxxxxxxxx>
- Re: crypto: aegis128: error: incompatible types when initializing type 'unsigned char' using type 'uint8x16_t'
- From: Justin Forbes <jmforbes@xxxxxxxxxxx>
- Re: linux-next: Tree for Jul 30 (drivers/crypto/chelsio/)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - Move debugfs fops into standalone file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algapi - Move crypto_yield into internal.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - add delay before polling mailbox
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v3 3/3] Input: snvs_pwrkey - only IRQ_HANDLED for our own events
- From: Marco Felsch <m.felsch@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] Input: snvs_pwrkey - enable snvs clock as needed
- From: Marco Felsch <m.felsch@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] Input: snvs_pwrkey - only IRQ_HANDLED for our own events
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v3 2/3] Input: snvs_pwrkey - enable snvs clock as needed
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: linux-next: Tree for Jul 29 (drivers/crypto/sa2ul.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v4] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] Input: snvs_pwrkey - only IRQ_HANDLED for our own events
- From: Marco Felsch <m.felsch@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] Input: snvs_pwrkey - enable snvs clock as needed
- From: Marco Felsch <m.felsch@xxxxxxxxxxxxxx>
- Re: [PATCH v31 00/12] /dev/random - a new approach with full SP800-90B
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [v3 PATCH 12/31] crypto: arm64/chacha - Add support for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 12/31] crypto: arm64/chacha - Add support for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Help getting aesni crypto patch upstream
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [v3 PATCH 0/31] crypto: skcipher - Add support for no chaining and partial chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 8/31] crypto: skcipher - Initialise requests to zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Help getting aesni crypto patch upstream
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- Re: [PATCH v31 00/12] /dev/random - a new approach with full SP800-90B
- From: Pavel Machek <pavel@xxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3] crypto: af_alg - add extra parameters for DRBG interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 0/31] crypto: skcipher - Add support for no chaining and partial chaining
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v3 PATCH 8/31] crypto: skcipher - Initialise requests to zero
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Fix kerneldoc
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [PATCH v3] crypto: af_alg - add extra parameters for DRBG interface
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] lib: Verify array index is correct before using it
- From: Huang Guobin <huangguobin4@xxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv2 2/2] hwrng: optee: fix wait use case
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- Re: [PATCH] hwrng: imx-rngc - setup default RNG quality
- From: Christian Eggers <ceggers@xxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] hwrng: imx-rngc - setup default RNG quality
- From: Marco Felsch <m.felsch@xxxxxxxxxxxxxx>
- [v3 PATCH 31/31] crypto: salsa20-generic - dd support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 30/31] crypto: kw - Set final_chunksize
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 29/31] crypto: ccree - Set final_chunksize on essiv
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 28/31] crypto: arm64/essiv - Set final_chunksize
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 27/31] crypto: simd - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 26/31] crypto: essiv - Set final_chunksize
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 25/31] crypto: nx - Set final_chunksize on rfc3686
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 24/31] crypto: ixp4xx - Remove rfc3686 implementation
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 23/31] crypto: inside-secure - Set final_chunksize on rfc3686
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 22/31] crypto: chelsio - Remove rfc3686 implementation
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 21/31] crypto: ccp - Remove rfc3686 implementation
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 20/31] crypto: nitrox - Set final_chunksize on rfc3686
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 19/31] crypto: caam - Remove rfc3686 implementations
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 18/31] crypto: crypto4xx - Remove rfc3686 implementation
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 17/31] crypto: ctr - Allow rfc3686 to be chained
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 16/31] crypto: caam/qi2 - Set final_chunksize on chacha
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 15/31] crypto: inside-secure - Set final_chunksize on chacha
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 14/31] crypto: x86/chacha - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 13/31] crypto: mips/chacha - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 12/31] crypto: arm64/chacha - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 11/31] crypto: arm/chacha - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 10/31] crypto: chacha-generic - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 9/31] crypto: cryptd - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 8/31] crypto: skcipher - Initialise requests to zero
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 7/31] crypto: skcipher - Add alg reqsize field
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 6/31] crypto: ccree - Add support for chaining CTS
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 5/31] crypto: nitrox - Add support for chaining CTS
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 4/31] crypto: arm64/aes-glue - Add support for chaining CTS
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 3/31] crypto: cts - Add support for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 2/31] crypto: algif_skcipher - Add support for final_chunksize
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 1/31] crypto: skcipher - Add final chunk size field for chaining
- From: "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 0/31] crypto: skcipher - Add support for no chaining and partial chaining
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/4] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH] crypto: ccree - Delete non-standard algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] drivers: crypto: add support for OCTEONTX2 CPT engine
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 19/26] net/ipv6: switch ipv6_flowlabel_opt to sockptr_t
- From: Ido Schimmel <idosch@xxxxxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 19/26] net/ipv6: switch ipv6_flowlabel_opt to sockptr_t
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] ARM: multi_v7_defconfig: enable caam crypto module
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: x86/curve25519 - Remove unused carry variables
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: x86/curve25519 - Remove unused carry variables
- From: Karthik Bhargavan <karthikeyan.bhargavan@xxxxxxxx>
- Re: [PATCH] crypto: x86/curve25519 - Remove unused carry variables
- From: Karthik Bhargavan <karthikeyan.bhargavan@xxxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]