Linux Crypto
[Prev Page][Next Page]
- [RFC PATCH] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] wusb: switch to cbcmac transform
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 3/3] fscrypt: switch to ESSIV shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 2/3] dm crypt: switch to essiv shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/3] crypto: essiv - create a new shash template for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: user - fix potential warnings in cryptouser.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - improve the skcipher API example code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add some more preemption points
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20poly1305 - a few cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: bcm - Make some symbols static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Use the correct style for SPDX License Identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - use struct_size() helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: mxs-dcp - Use devm_platform_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] crypto: rc4 cleanup
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] crypto: rc4 cleanup
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/20] crypto: arm/aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- [PATCH] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix max key size for sha384 and sha512
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- [RFC PATCH 20/20] crypto: arm/ghash - provide a synchronous version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 19/20] crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 17/20] crypto: aes - move ctr(aes) non-SIMD fallback to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 18/20] crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 15/20] crypto: generic/aes - drop key expansion routine in favor of library version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 16/20] crypto: arm64/aes-ce-cipher - use AES library as fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 14/20] crypto: arm64/aes-ce - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 13/20] crypto: arm64/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 12/20] crypto: arm64/aes-ccm - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 11/20] crypto: arm/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 10/20] crypto: arm64/ghash - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 09/20] crypto: safexcel/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 06/20] crypto: x86/aes - drop scalar assembler implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 08/20] crypto: cesa/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 04/20] crypto: aes - create AES library based on the fixed time AES code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 07/20] crypto: padlock/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 05/20] crypto: x86/aes-ni - switch to generic for fallback and key routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 03/20] crypto: aes/fixed-time - align key schedule with other implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 02/20] crypto: arm/aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 01/20] crypto: arm/aes-ce - cosmetic/whitespace cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - fix max key size for sha384 and sha512
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 7/7] fs: cifs: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 6/7] ppp: mppe: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v1 0/5] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v11 11/13] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 13/13] ima: Allow template= option for appraise rules as well
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 10/13] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 09/13] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 04/13] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 01/13] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 00/13] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH] crypto: vmx - Document CTR mode counter width quirks
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v7 00/12] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: caam - use len instead of nents for bulding HW S/G table
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: caam - update IV using HW support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - update IV using HW support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: user - fix potential warnings in cryptouser.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 3/4] crypto: caam - correct DMA address size for the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 2/4] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 0/4] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 3/3] lib80211/wep: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 2/3] lib80211/tkip: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/3] net/mac80211: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: "Saidi, Ali" <alisaidi@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: (2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/2] crypto: sahara - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/2] crypto: mxs-dcp - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [PATCH] crypto: qat - use struct_size() helper
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Nishad Kamdar <nishadkamdar@xxxxxxxxx>
- RE:(2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 5/5] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 4/5] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 3/5] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 0/5] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: mmotm 2019-06-04-16-33 uploaded (drivers/crypto/atmel)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: chacha20poly1305 - fix atomic sleep when using async algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lrw - use correct alignmask
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - test the shash API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha2-ce - correct digest for empty data in finup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha1-ce - correct digest for empty data in finup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Jitter RNG - update implementation to 2.1.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/14] crypto: inside-secure - self-test fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: mmotm 2019-06-04-16-33 uploaded (drivers/crypto/atmel)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: "Saidi, Ali" <alisaidi@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: David Sterba <dsterba@xxxxxxx>
- [PATCH] crypto: cavium/nitrox - Use the correct style for SPDX License Identifier
- From: Nishad Kamdar <nishadkamdar@xxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] Add support for Graviton TRNG
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 3/3] hwrng: Add support for AWS Graviton TRNG
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 1/3] arm/arm64: Add smccc hypervisor service identifiers
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH -next] crypto: bcm - Make some symbols static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- RE:(2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- RE:(2) [PATCH 0/4] zstd: reduce stack usage
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Re: Question about padata's callback cpu
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/4] zstd: reduce stack usage
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] zstd: move params structure to global variable to reduce stack usage
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] zstd: change structure variable from int to char
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 3/4] zstd: move params structure to global variable to reduce stack usage
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 2/4] zstd: use U16 data type for rankPos
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 0/4] zstd: reduce stack usage
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add some more preemption points
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: doc - improve the skcipher API example code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: chacha20poly1305 - a few cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: doc - improve the skcipher API example code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - add some more preemption points
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: make all generic algorithms set cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: algapi - require cra_name and cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500 - fix license comment syntax error
- From: "Alex Xu (Hello71)" <alex_y_xu@xxxxxxxx>
- [PATCH 3/4] drivers: crypto: picoxcell_crypto: use MODULE_DECLARE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 4/4] drivers: ata: use MODULE_DECLARE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 1/4] mod_devicetable: helper macro for declaring oftree module device table
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- RFC: declaring DT match tables (2nd take)
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 2/4] drivers: block: xsysace: use MODULE_DECLARE_OF_TABLE() and of_match_ptr()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: chacha20poly1305 - fix atomic sleep when using async algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH 1/3] mod_devicetable: helper macro for declaring oftree module device table
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 3/3] drivers: crypto: picoxcell_crypto: use MODULE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 2/3] drivers: block: xsysace: use MODULE_OF_TABLE() and of_match_ptr()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- RFC: get rid of #ifdef CONFIG_OF's around of match tables
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH] crypto: pcrypt: Fix possible deadlock in padata_sysfs_release
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] crypto: pcrypt: Fix possible deadlock in padata_sysfs_release
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto: atmel - Fix sparse endianness warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: lrw - use correct alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Issues with initialising generic crypto implementations earlier on ARMv7
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: gcm - fix cacheline sharing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: gcm - fix cacheline sharing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v2 0/6] crypto - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - print IV only when non NULL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi - remove crypto_tfm_in_queue()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - remove CRYPTO_ALG_TYPE_DIGEST
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - move kcrypto_wq into cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gf128mul - make unselectable by user
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: echainiv - change to 'default n'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: make all templates select CRYPTO_MANAGER
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - make extra tests depend on cryptomgr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - fix length truncation with large page size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to skcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: hw_random: meson-rng: update with SPDX Licence identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [cryptodev:master 56/59] drivers/crypto/atmel-i2c.c:39:18: sparse: sparse: incorrect type in assignment (different base types)
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Can an ahash driver be used through shash API?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Issues with initialising generic crypto implementations earlier on ARMv7
- From: Robin Murphy <robin.murphy@xxxxxxx>
- RE: [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- RE: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Issues with initialising generic crypto implementations earlier on ARMv7
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] crypto: mxs-dcp: Implement reference keys
- From: Richard Weinberger <richard@xxxxxx>
- [RFC PATCH 1/2] crypto: Allow working with key references
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: Jitter RNG - update implementation to 2.1.2
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Conding style question regarding configuration
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Can an ahash driver be used through shash API?
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Question about padata's callback cpu
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - test the shash API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: testmgr - test the shash API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] arm64 sha2-ce finup: correct digest for empty data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64 sha2-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- [bug report] crypto: qat - Intel(R) QAT driver framework
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 08/15] crypto: talitos - Do not modify req->cryptlen on decryption.
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/14] crypto: inside-secure - unify cache reset
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/14] crypto: inside-secure - remove useless check
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/14] crypto: inside-secure - move comment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 13/14] crypto: inside-secure - fix use of the SG list
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 14/14] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/14] crypto: inside-secure - add support for HMAC updates
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/14] crypto: inside-secure - implement IV retrieval
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/14] crypto: inside-secure - fix zeroing of the request in ahash_exit_inv
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/14] crypto: inside-secure - fix queued len computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/14] crypto: inside-secure - self-test fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/14] crypto: inside-secure - enable context reuse
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/14] crypto: inside-secure - change returned error when a descriptor reports an error
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/14] crypto: inside-secure - improve the result error format when displayed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/14] crypto: inside-secure - fix coding style for a condition
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/14] crypto: inside-secure - remove empty line
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- inside secure driver update
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: atmel-ecc: factor out code that can be shared
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] crypto - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] crypto: caam: print messages in caam_dump_sg at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam: print IV only when non NULL
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam: remove unused defines
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 1/2] crypto: crypto4xx - fix blocksize for cfb and ofb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - print debugging hex dumps after unmapping
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - AES CFB mode is a stream cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] arm/sha512 - Make sha512_arm_final static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: caam - IOMMU support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ixp4xx - Fix cross-compile errors due to type mismatch
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha512 - make function static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 082/317] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 065/244] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 042/167] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 027/114] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: arm/sha512 - make function static
- From: Philippe Mazenauer <philippe.mazenauer@xxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: jitterentropy - change back to module_init()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Extra selftests failure on Talitos SEC1 hash algs - how can I identify the issue ?
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 3/3] crypto: caam: print messages in caam_dump_sg at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 1/3] crypto: caam: remove unused defines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 08/15] crypto: talitos - Do not modify req->cryptlen on decryption.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 11/15] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 09/15] crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 12/15] crypto: talitos - fix AEAD processing.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 13/15] Revert "crypto: talitos - export the talitos_submit function"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 14/15] crypto: talitos - use IS_ENABLED() in has_ftr_sec1()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 15/15] crypto: talitos - use SPDX-License-Identifier
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 06/15] crypto: talitos - check data blocksize in ablkcipher.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 07/15] crypto: talitos - fix ECB algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 04/15] crypto: talitos - check AES key size
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 03/15] crypto: talitos - reduce max key size for SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 01/15] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 10/15] crypto: talitos - properly handle split ICV.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 05/15] crypto: talitos - fix CTR alg blocksize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to skcipher API
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v7 00/12] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v6 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]