Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: qat - change SLAs cleanup flow at shutdown
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: hisilicon/qm - add stop function and obtain queue status
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - State in dmesg that TSME is enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] Add support for NIST P521 to ecdsa and ecdh
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2 2/3] mm/zswap: remove the memcpy if acomp is not sleepable
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v2 00/14] Add support for NIST P521 to ecdsa and ecdh
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] Add support for NIST P521 to ecdsa and ecdh
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH v2 06/14] crypto: ecc - Add NIST P521 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH v2 06/14] crypto: ecc - Add NIST P521 curve parameters
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- [PATCH 3/3] crypto: qat - make ring to service map common for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 1/3] crypto: qat - fix ring to service map for dcc in 4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 2/3] crypto: qat - fix ring to service map for dcc in 420xx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 0/3] crypto: qat - fix and make common ring to service map in QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH] crypto: qat - uninitialized variable in adf_hb_error_inject_write()
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 6/6] crypto: qat - fix comment structure
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 5/6] crypto: qat - remove unnecessary description from comment
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 3/6] crypto: qat - avoid division by zero
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 4/6] crypto: qat - remove double initialization of value
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 2/6] crypto: qat - removed unused macro in adf_cnv_dbgfs.c
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 1/6] crypto: qat - remove unused macros in qat_comp_alg.c
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 0/6] crypto: qat - fix warnings reported by clang
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- Re: [PATCH v2 2/3] mm/zswap: remove the memcpy if acomp is not sleepable
- From: Chengming Zhou <zhouchengming@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: Stephan Gerhold <stephan@xxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] mm/zswap: remove the memcpy if acomp is not sleepable
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v2 2/3] mm/zswap: remove the memcpy if acomp is not sleepable
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v2 2/3] mm/zswap: remove the memcpy if acomp is not sleepable
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v2 1/3] crypto: introduce acomp_is_sleepable to expose if a acomp has a scomp backend
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH v2 0/3] mm/zswap & crypto/acompress: remove a couple of memcpy
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH 2/3] mm/zswap: remove the memcpy if acomp is not asynchronous
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Barry Song <21cnbao@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 13/14] crypto: ecdh - Use functions to copy digits from and to byte array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 14/14] crypto: ecdh - Add support for NIST P521 and add test case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 12/14] crypto: ecc - Implement and use ecc_curve_get_nbytes to get curve's nbytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 11/14] crypto: Add nbits field to ecc_curve structure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 10/14] crypto: ecc - Implement ecc_digits_to_bytes to convert digits to byte array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 08/14] x509: Add OID for NIST P521 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 09/14] crypto: ecdh - Use properly formatted digits to check for valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 07/14] crypto: ecdsa - Register NIST P521 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 04/14] crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 06/14] crypto: ecc - Add NIST P521 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 05/14] crypto: ecc - For NIST P521 use vli_num_bits to get number of bits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 03/14] crypto: ecdsa - Extend res.x mod n calculation for NIST P521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 02/14] crypto: ecdsa - Adjust tests on length of key parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 01/14] crypto: ecdsa - Convert byte arrays with key coordinates to digits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 00/14] Add support for NIST P521 to ecdsa and ecdh
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v4 16/20] dt-bindings: crypto: meson: support new SoC's
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: code question for dh to kernel v6.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: code question for dh to kernel v6.5
- From: HelenH Zhang <helenz98@xxxxxxxxx>
- Re: [PATCH v4 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v4 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/15] crypto: Add twopass lskcipher for adiantum
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 13/15] crypto: cts,xts - Update parameters blocksize/chunksize/tailsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 09/15] crypto: chacha-generic - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/15] crypto: algif_skcipher - Disallow nonincremental algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/15] crypto: skcipher - Add tailsize attribute
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: code question for dh to kernel v6.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/15] crypto: skcipher - Add tailsize attribute
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 09/15] crypto: chacha-generic - Convert from skcipher to lskcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/15] crypto: Add twopass lskcipher for adiantum
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 13/15] crypto: cts,xts - Update parameters blocksize/chunksize/tailsize
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/15] crypto: algif_skcipher - Disallow nonincremental algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH riscv/for-next] crypto: riscv - add vector crypto accelerated AES-CBC-CTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 13/15] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 11/15] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 12/15] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 10/15] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 09/15] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 02/15] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 08/15] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 05/15] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH riscv/for-next] crypto: riscv - add vector crypto accelerated AES-CBC-CTS
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: qat - uninitialized variable in adf_hb_error_inject_write()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: ccp: Update return values for some unit tests
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 1/2] crypto: ccp: Avoid discarding errors in psp_send_platform_access_msg()
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: Andreas Larsson <andreas@xxxxxxxxxxx>
- Re: [PATCH] [v2] ARM: crypto: fix function cast warnings
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ARM: crypto: fix function cast warnings
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] [v2] ARM: crypto: fix function cast warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- RE: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH v4 01/15] ice, ufs, mmc: use blk_crypto_key for program_key
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH] ARM: crypto: fix function cast warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- [PATCH] ARM: crypto: fix function cast warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- [PATCH 14/15] crypto: lskcipher - Export incremental interface internally
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/15] crypto: adiantum - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/15] crypto: cts - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/15] crypto: cts,xts - Update parameters blocksize/chunksize/tailsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/15] crypto: skcipher - Move nesting check into ecb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/15] crypto: skcipher - Add incremental support to lskcipher wrapper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/15] crypto: skcipher - Propagate zero-length requests to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/15] crypto: chacha-generic - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/15] crypto: adiantum - Use lskcipher instead of cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/15] crypto: algif_skcipher - Disallow nonincremental algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/15] crypto: xts - Convert from skcipher to lskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/15] crypto: skcipher - Add twopass attribute
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/15] crypto: algif_skcipher - Add support for tailsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/15] crypto: skcipher - Remove ivsize check for lskcipher simple templates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/15] crypto: skcipher - Add tailsize attribute
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/15] crypto: Add twopass lskcipher for adiantum
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/20] Support more Amlogic SoC families in crypto driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH riscv/for-next] crypto: riscv - add vector crypto accelerated AES-CBC-CTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- RE: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 10/20] drivers: crypto: meson: avoid kzalloc in engine thread
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 08/20] drivers: crypto: meson: cleanup defines
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 07/20] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 06/20] drivers: crypto: meson: drop status field from meson_flow
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 05/20] drivers: crypto: meson: move get_engine_number()
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 04/20] drivers: crypto: meson: add MMIO helpers
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 03/20] drivers: crypto: meson: make CLK controller optional
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 02/20] drviers: crypto: meson: add platform data
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 19/20] arch: arm64: dts: meson: g12: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 18/20] arch: arm64: dts: meson: s4: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 17/20] arch: arm64: dts: meson: a1: add crypto node
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 00/20] Support more Amlogic SoC families in crypto driver
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 01/20] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 13/20] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 17/20] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 19/20] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 18/20] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 15/20] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 16/20] dt-bindings: crypto: meson: support new SoC's
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 11/20] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 14/20] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 12/20] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 10/20] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 08/20] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 07/20] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 03/20] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 06/20] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 05/20] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 04/20] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 02/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v4 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH] Documentation: qat: fix auto_reset section
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: linux-next: build warning after merge of the crypto tree
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- linux-next: build warning after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH riscv/for-next] crypto: riscv - parallelize AES-CBC decryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH riscv/for-next] crypto: riscv - parallelize AES-CBC decryption
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 01/14] crypto: ecdsa - Convert byte arrays with key coordinates to digits
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Avoid discarding errors in psp_send_platform_access_msg()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: qat - resolve race condition during AER recovery
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH] crypto: qat - change SLAs cleanup flow at shutdown
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Steven Price <steven.price@xxxxxxx>
- RE: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH v2] crypto: rsa - restrict plaintext/ciphertext values more
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] virtio_crypto: remove duplicate check if queue is broken
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] crypto: qat - improve recovery flows
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xilinx: call finalize with bh disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 07/14] crypto: ecdsa - Register NIST P521 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 12/14] crypto: ecc - Implement and use ecc_curve_get_nbytes to get curve's nbytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 04/14] crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 08/14] x509: Add OID for NIST P521 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 14/14] crypto: ecdh - Add support for NIST P521 and add test case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 13/14] crypto: ecdh - Use functions to copy digits from and to array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 10/14] crypto: ecc - Implement ecc_digits_to_array to convert digits to byte array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 05/14] crypto: ecc - For NIST P521 use vli_num_bits to get number of bits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 06/14] crypto: ecc - Add NIST P521 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 09/14] crypto: ecdh - Use properly formatted digits to check for valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 11/14] crypto: Add nbits field to ecc_curve structure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 03/14] crypto: ecdsa - Adjust res.x mod n for NIST P521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 02/14] crypto: ecdsa - Adjust tests on length of key material
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 01/14] crypto: ecdsa - Convert byte arrays with key coordinates to digits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 00/14] Add support for NIST P521 to ecdsa and ecdh
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Avoid discarding errors in psp_send_platform_access_msg()
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- RE: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH v2] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v3 16/20] dt-bindings: crypto: meson: support new SoC's
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH riscv/for-next] crypto: riscv - parallelize AES-CBC decryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: A question about modifying the buffer under authenticated encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: A question about modifying the buffer under authenticated encryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: A question about modifying the buffer under authenticated encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 2/2] crypto: ccp: Update return values for some unit tests
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/2] crypto: ccp: Avoid discarding errors in psp_send_platform_access_msg()
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: A question about modifying the buffer under authenticated encryption
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH v2 0/3] crypto: hisilicon/qm - add stop function and obtain queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: hisilicon/qm - add stop function by hardware
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: hisilicon/qm - change function type to void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH 1/3] dm integrity: do not filter algos with CRYPTO_ALG_ALLOCATES_MEMORY
- From: Meenakshi Aggarwal <meenakshi.aggarwal@xxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: A question about modifying the buffer under authenticated encryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- A question about modifying the buffer under authenticated encryption
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - State in dmesg that TSME is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Failed self-test on ffdhe6144(qat-dh)
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- CONFIG_JITTERENTROPY needs more explanation?
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v3 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v3 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Sub: USGV6 test v6LC.2.2.23- Processing Router Advertisement failure on version 5.10
- From: "Jayalakshmi Manunath Bhat ," <bhat.jayalakshmi@xxxxxxxxx>
- Re: [PATCH v4 03/15] qcom_scm: scm call for create, prepare and import keys
- From: Bartosz Golaszewski <bartosz.golaszewski@xxxxxxxxxx>
- Re: [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Bartosz Golaszewski <bartosz.golaszewski@xxxxxxxxxx>
- Re: [PATCH v4 01/15] ice, ufs, mmc: use blk_crypto_key for program_key
- From: Bartosz Golaszewski <bartosz.golaszewski@xxxxxxxxxx>
- RE: [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: Failed self-test on ffdhe6144(qat-dh)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: Jesse Brandeburg <jesse.brandeburg@xxxxxxxxx>
- Re: [PATCH v2] Enable config for sm3, sm4, polyval, xctr cipher test as built in module.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 10/15] ufs: host: wrapped keys support in ufs qcom
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 09/15] ufs: core: add support for generate, import and prepare keys
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 08/15] ufs: core: add support to derive software secret
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 06/15] soc: qcom: ice: support for generate, import and prepare key
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 05/15] soc: qcom: ice: support for hardware wrapped keys
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 04/15] soc: qcom: ice: add hwkm support in ice
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v4 03/15] qcom_scm: scm call for create, prepare and import keys
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH v3 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 19/20] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 16/20] dt-bindings: crypto: meson: support new SoC's
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 18/20] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 15/20] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 13/20] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 17/20] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 14/20] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 12/20] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 11/20] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 10/20] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 06/20] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 05/20] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 08/20] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 04/20] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 07/20] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 03/20] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 02/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 01/20] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v3 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - State in dmesg that TSME is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Failed self-test on ffdhe6144(qat-dh)
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- RE: [EXT] Re: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- [PATCH v2] Enable config for sm3, sm4, polyval, xctr cipher test as built in module.
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Failed self-test on ffdhe6144(qat-dh)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [ANNOUNCE] CFP: Linux Security Summit Europe 2024
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [EXTERNAL] [PATCH v4 05/15] soc: qcom: ice: support for hardware wrapped keys
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [EXTERNAL] [PATCH v4 04/15] soc: qcom: ice: add hwkm support in ice
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [EXTERNAL] [PATCH 07/10] crypto: qat - add bank save and restore flows
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [PATCH v8 02/13] dt-bindings: treewide: add access-controllers description
- From: Wolfram Sang <wsa@xxxxxxxxxx>
- Re: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Shawn Guo <shawn.gsc@xxxxxxxxx>
- [PATCH v2] crypto: rsa - restrict plaintext/ciphertext values more
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: qat - improve aer error reset handling
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 8/9] crypto: qat - limit heartbeat notifications
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 7/9] crypto: qat - add auto reset on error
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 6/9] crypto: qat - add fatal error notification
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 5/9] crypto: qat - re-enable sriov after pf reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 4/9] crypto: qat - update PFVF protocol for recovery
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 2/9] crypto: qat - add fatal error notify method
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 3/9] crypto: qat - disable arbitration before reset
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 1/9] crypto: qat - add heartbeat error simulator
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 0/9] crypto: qat - improve recovery flows
- From: Mun Chun Yep <mun.chun.yep@xxxxxxxxx>
- [PATCH v2 6/6] ubsan: Get x86_64 booting with unsigned wrap-around sanitizer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 5/6] ubsan: Split wrapping sanitizer Makefile rules
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/6] ubsan: Introduce CONFIG_UBSAN_POINTER_WRAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 4/6] ubsan: Remove CONFIG_UBSAN_SANITIZE_ALL
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/6] ubsan: Use Clang's -fsanitize-trap=undefined option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/6] ubsan: Introduce wrap-around sanitizers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ahash - unexport crypto_hash_alg_has_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/zip - Modify some data type and code cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- [PATCH 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 09/10] crypto: qat - implement interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 08/10] crypto: qat - add interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 07/10] crypto: qat - add bank save and restore flows
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 06/10] crypto: qat - expand CSR operations for QAT GEN4 devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 05/10] crypto: qat - rename get_sla_arr_of_type()
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 02/10] crypto: qat - relocate and rename 4xxx PF2VM definitions
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 04/10] crypto: qat - relocate CSR access code
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 03/10] crypto: qat - move PFVF compat checker to a function
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 01/10] crypto: qat - adf_get_etr_base() helper
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH 00/10] crypto: qat - enable SRIOV VF live migration for
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH RESEND] virtio_crypto: remove duplicate check if queue is broken
- From: Li RongQing <lirongqing@xxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_hash - Remove bogus SGL free on zero-length error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] crypto: algif_hash - Remove bogus SGL free on zero-length error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: taoqi <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5.10.y] crypto: caam/jr - Fix possible caam_jr crash
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Bjorn Andersson <quic_bjorande@xxxxxxxxxxx>
- Help needed to understand the mailing group for networking user questions
- From: "Jayalakshmi Manunath Bhat ," <bhat.jayalakshmi@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] crypto: cbc - Ensure statesize is zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] MAINTAINERS: adjust file entries after crypto vmx file movement
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
- From: Lenko Donchev <lenko.donchev@xxxxxxxxx>
- [syzbot] [crypto?] BUG: unable to handle kernel NULL pointer dereference in crypto_arc4_crypt
- From: syzbot <syzbot+050eeedd6c285d8c42f2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 14/15] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] crypto: xilinx: call finalize with bh disabled
- From: quanyang.wang@xxxxxxxxxxxxx
- Re: [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- [PATCH v4 06/15] soc: qcom: ice: support for generate, import and prepare key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 14/15] arm64: dts: qcom: sm8650: add hwkm support to ufs ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 00/15] Hardware wrapped key support for qcom ice and ufs
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 07/15] ufs: core: support wrapped keys in ufs core
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 03/15] qcom_scm: scm call for create, prepare and import keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 02/15] qcom_scm: scm call for deriving a software secret
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 09/15] ufs: core: add support for generate, import and prepare keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 04/15] soc: qcom: ice: add hwkm support in ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 10/15] ufs: host: wrapped keys support in ufs qcom
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 13/15] dt-bindings: crypto: ice: document the hwkm property
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 11/15] ufs: host: implement derive sw secret vop in ufs qcom
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 08/15] ufs: core: add support to derive software secret
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 15/15] arm64: dts: qcom: sm8550: add hwkm support to ufs ice
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 12/15] ufs: host: support for generate, import and prepare key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 01/15] ice, ufs, mmc: use blk_crypto_key for program_key
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- [PATCH v4 05/15] soc: qcom: ice: support for hardware wrapped keys
- From: Gaurav Kashyap <quic_gaurkash@xxxxxxxxxxx>
- Re: [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Barry Song <21cnbao@xxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon/qm - obtain stop queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/3] crypto: hisilicon/qm - add stop function by hardware
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 3/3] crypto: hisilicon/qm - change function type to void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/3] crypto: hisilicon/qm - add stop function and obtain queue status
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] RISC-V: fix check for zvkb with tip-of-tree clang
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ahash - unexport crypto_hash_alg_has_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/zip - Modify some data type and code cleanup
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in af_alg_free_sg (2)
- From: xingwei lee <xrivendell7@xxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: hisilicon/sec2 - modify nested macro call
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KEYS: include header for EINVAL definition
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v1] crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hisilicon/sec2 - updates the sec DFX function register
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: hisilicon/sec - remove unused parameter
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: hisilicon/sec - remove unused parameter
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hisilicon/sec2 - updates the sec DFX function register
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Remove header table code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: hisilicon/sec2 - modify nested macro call
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Qi Tao <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Fix smp_processor_id() warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] crypto: Clean up arm64 AES-CCM code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix asynchronous hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: pcbc: remove redundant assignment to nbytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon/qm - add debugfs qm_state for hisilicon driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - avoid memcpy() overflow warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto:vmx: Move ppc vmx diirectory to arch/powerpc/crypto.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: taoqi <taoqi10@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH] crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: scompress: remove memcpy if sg_nents is 1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] mm/zswap: reuse dstmem when decompress
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: hisilicon/sec2 - fix some cleanup issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v8 3/3] selftests: bpf: crypto skcipher algo selftests
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 2/3] bpf: crypto: add skcipher to bpf crypto
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] virtio_crypto: remove duplicate check if queue is broken
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH v2 00/20] Support more Amlogic SoC families in crypto driver
- From: neil.armstrong@xxxxxxxxxx
- [PATCH v4 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v4 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 02/20] drivers: crypto: meson: make CLK controller optional
- From: Jerome Brunet <jbrunet@xxxxxxxxxxxx>
- Re: [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH bpf-next v8 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- [PATCH v2 06/20] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 17/20] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 01/20] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 03/20] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 18/20] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 04/20] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 08/20] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 15/20] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 20/20] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 19/20] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 16/20] dt-bindings: crypto: meson: add new compatibles
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 14/20] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 13/20] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 11/20] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 12/20] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 10/20] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 09/20] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 07/20] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 05/20] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 00/20] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v2 02/20] drivers: crypto: meson: make CLK controller optional
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Christoph Müllner <christoph.muellner@xxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: (subset) [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: Build regressions/improvements in v6.8-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH v2 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH 46/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 39/82] crypto: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 10/10] crypto: riscv - add vector crypto accelerated SM4
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 09/10] crypto: riscv - add vector crypto accelerated SM3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 08/10] crypto: riscv - add vector crypto accelerated SHA-{512,384}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 06/10] crypto: riscv - add vector crypto accelerated GHASH
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 07/10] crypto: riscv - add vector crypto accelerated SHA-{256,224}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 04/10] crypto: riscv - add vector crypto accelerated AES-{ECB,CBC,CTR,XTS}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 05/10] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 03/10] RISC-V: hook new crypto subdir into build-system
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 02/10] RISC-V: add TOOLCHAIN_HAS_VECTOR_CRYPTO
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 01/10] RISC-V: add helper function to read the vector VLEN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 00/10] RISC-V crypto with reworked asm files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove unused xts4096 and xts512 algorithms from testmgr.c
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] crypto: rsa - restrict plaintext/ciphertext values more in FIPS mode
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v4 8/8] arm64: dts: qcom: Add support for Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 7/8] arm64: dts: qcom: sm7125-xiaomi-common: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 6/8] arm64: dts: qcom: sc7180: Add UFS nodes
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 5/8] phy: qcom: qmp-ufs: Add SC7180 support
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 4/8] dt-bindings: arm: qcom: Add Xiaomi Redmi Note 9S
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH v4 0/8] Add UFS support for SC7180/SM7125
- From: David Wronek <davidwronek@xxxxxxxxx>
- [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
- From: Erick Archer <erick.archer@xxxxxxx>
- [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
- From: Erick Archer <erick.archer@xxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 02/13] dt-bindings: treewide: add access-controllers description
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH] crypto: hisilicon - Fix smp_processor_id() warnings
- From: Wenkai Lin <linwenkai6@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] some updates and cleanups for hisilicon/sec2.
- From: taoqi <taoqi10@xxxxxxxxxx>
- [PATCH v2 8/8] crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: arm64/aes-ccm - Pass short inputs via stack buffer
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 0/8] crypto: Clean up arm64 AES-CCM code
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH][next] crypto: asymmetric_keys: remove redundant pointer secs
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2] crypto: caam: fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH][next] crypto: pcbc: remove redundant assignment to nbytes
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Fabio Estevam <festevam@xxxxxxxxx>
- RE: [PATCH v1] imx_v6_v7_defconfig: Enable sm3, sm4, polyval, xctr cipher test support
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- [PATCH] crypto: caam/hash - fix asynchronous hash
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- [PATCH v2 5/5] crypto: starfive: Add sm4 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] crypto: starfive: Update hash dma usage
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: starfive: Add support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: starfive: Use dma for aes requests
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] dt-bindings: crypto: starfive: Add jh8100 compatible string
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] crypto: starfive: Add sm3 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Mikko Perttunen <cyndis@xxxxxxxx>
- [PATCH 1/3] crypto: padlock-sha: Matches CPU with Family with 6 explicitly
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 2/3] x86/cpufeatures: Add CPU feature flags for Zhaoxin Hash Engine
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 3/3] crypto: Zhaoxin: Hardware Engine Driver for SHA1/256/384/512
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- [PATCH 0/3] Add Zhaoxin hardware engine driver support for SHA
- From: Tony W Wang-oc <TonyWWang-oc@xxxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH AUTOSEL 4.19 08/12] crypto: stm32/crc32 - fix parsing list of devices
- From: Sasha Levin <sashal@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]