Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] crypto: zlib-deflate - add zlib-deflate test case in tcrypt
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: Dave Taht <dave.taht@xxxxxxxxx>
- Re: chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: Chacha-Poly performance on ARM64
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: Chacha-Poly performance on ARM64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Chacha-Poly performance on ARM64
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - use mapped_{src,dst}_nents for descriptor
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto: caam - use mapped_{src,dst}_nents for descriptor
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: Toke Høiland-Jørgensen <toke@xxxxxxx>
- chapoly acceleration hardware [Was: Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API]
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: caam - use mapped_{src,dst}_nents for descriptor
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: caam - use mapped_{src,dst}_nents for descriptor
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 11/18] int128: move __uint128_t compiler test to Kconfig
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 11/18] int128: move __uint128_t compiler test to Kconfig
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 15/18] net: WireGuard secure network tunnel
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 14/18] crypto: chacha20poly1305 - import construction and selftest from Zinc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 18/18] net: wireguard - switch to crypto API for packet encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 13/18] crypto: Curve25519 - generic C library implementations and selftest
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 17/18] wg switch to lib/crypto algos
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 12/18] crypto: BLAKE2s - generic C library implementation and selftest
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 16/18] netlink: use new strict length types in policy for 5.2
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 11/18] int128: move __uint128_t compiler test to Kconfig
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 09/18] crypto: poly1305 - move core algorithm into lib/crypto
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 10/18] crypto: poly1305 - add init/update/final library routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 08/18] crypto: testmgr - add a chacha20poly1305 test case
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 03/18] crypto: arm/poly1305 - incorporate OpenSSL/CRYPTOGAMS NEON implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 06/18] crypto: rfc7539 - switch to shash for Poly1305
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 07/18] crypto: rfc7539 - use zero reqsize for sync instantiations without alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 04/18] crypto: arm64/poly1305 - incorporate OpenSSL/CRYPTOGAMS NEON implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 05/18] crypto: chacha - move existing library code into lib/crypto
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 01/18] crypto: shash - add plumbing for operating on scatterlists
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 00/18] crypto: wireguard using the existing crypto API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 02/18] crypto: x86/poly1305 - implement .update_from_sg method
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: caam - use mapped_{src,dst}_nents for descriptor
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 0/2] crypto: sun4i-ss: Enable power management
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 5.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [GIT PULL] Crypto Fixes for 5.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.2 152/185] s390/crypto: xts-aes-s390 fix extra run-time crypto self tests finding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 49/60] s390/crypto: xts-aes-s390 fix extra run-time crypto self tests finding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 74/89] s390/crypto: xts-aes-s390 fix extra run-time crypto self tests finding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 107/128] s390/crypto: xts-aes-s390 fix extra run-time crypto self tests finding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 167/203] s390/crypto: xts-aes-s390 fix extra run-time crypto self tests finding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v2 1/3] mm: Introduce page_size()
- From: "Weiny, Ira" <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v2] dt-bindings: crypto: samsung: Convert SSS and SlimSSS bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 5/8] dt-bindings: watchdog: Convert Samsung SoC watchdog bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] dt-bindings: pwm: Convert Samsung PWM bindings to json-schema
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - use the same jr for rng init/exit
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 10/12] crypto: caam - populate platform devices last
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 09/12] crypto: caam - user devres to populate platform devices
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 08/12] crypto: caam - use devres to de-initialize QI
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: John Garry <john.garry@xxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: talitos - fix missing break in switch statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] [v2] crypto: hisilicon - avoid unused function warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: don't wait on add_early_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: hisilicon - Fix double free in sec_free_hw_sgl()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv4] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: John Garry <john.garry@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix missing break in switch statement
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - fix firmware assignment to AE cores
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- [PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: qce - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Eneas U de Queiroz <cotequeiroz@xxxxxxxxx>
- [PATCH] crypto: chtls - simplify a bit 'create_flowc_wr_skb()'
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: Can KEY_DH_OPERATIONS become tristate? (was: Re: Kernel 5.3.0 stuck during boot on Amiga)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Release all allocated memory if sha type is invalid
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [PATCH v2] crypto: ccp - Release all allocated memory if sha type is invalid
- From: Navid Emamdoost <navid.emamdoost@xxxxxxxxx>
- [PATCH 2/2] [v2] crypto: hisilicon - allow compile-testing on x86
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/2] crypto: hisilicon - allow compile-testing on x86
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] [v2] crypto: hisilicon - avoid unused function warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - release hmac_buf if ccp_run_sha_cmd fails
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: crypto: aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: aes - rename local routines to prevent future clashes
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: INFO: task hung in cancel_delayed_work_sync
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: INFO: task hung in cancel_delayed_work_sync
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: INFO: task hung in cancel_delayed_work_sync
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/2] crypto: sun4i-ss: Enable power management
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCHv4 2/3] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 3/3] crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 1/3] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v2 1/5] padata: make flushing work with async users
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 5.4
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2 8/8] dt-bindings: pwm: Convert Samsung PWM bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 7/8] dt-bindings: pwm: Convert PWM bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 6/8] dt-bindings: watchdog: Add missing clocks requirement in Samsung SoC watchdog
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 5/8] dt-bindings: watchdog: Convert Samsung SoC watchdog bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 4/8] dt-bindings: memory-controllers: Convert Samsung Exynos SROM bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 3/8] dt-bindings: sram: Convert Samsung Exynos SYSRAM bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 2/8] dt-bindings: sram: Convert SRAM bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 1/8] dt-bindings: rng: exynos4-rng: Convert Exynos PRNG bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] hwrng: iproc-rng200 - Use devm_platform_ioremap_resource() in iproc_rng200_probe()
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: Can KEY_DH_OPERATIONS become tristate? (was: Re: Kernel 5.3.0 stuck during boot on Amiga)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] hwrng: iproc-rng200 - Use devm_platform_ioremap_resource() in iproc_rng200_probe()
- From: Ray Jui <ray.jui@xxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - Add support for the EIP196
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Add mailbox message to get mcode info in VF
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Add support for 256 bit wide internal bus
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add support for HW with less ring AIC's than rings
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - Add support for eip197f_iewc
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] hwrng: mediatek: Use devm_platform_ioremap_resource() in mtk_rng_probe()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- [PATCH] jitterentropy: fix comments
- From: "Alexander E. Patrakov" <patrakov@xxxxxxxxx>
- [PATCH] hwrng: iproc-rng200 - Use devm_platform_ioremap_resource() in iproc_rng200_probe()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 07/12] crypto: caam - use devres to de-initialize the RNG
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH] crypto: caam - use the same jr for rng init/exit
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: don't wait on add_early_randomness()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] hw_random: don't wait on add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [PATCH] hw_random: don't wait on add_early_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for the rfc4543(gcm(aes)) "AEAD"
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for the rfc4309(ccm(aes)) AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add ESP GCM/GMAC/CCM variants
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for the rfc4106(gcm(aes)) AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure: [URGENT] Fix stability issue with Macchiatobin
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Fixed corner case TRC admin RAM probing issue
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure: [URGENT] Fix stability issue
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] hw_random: don't wait on add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 2/2] crypto: arm/aes-ce - add dependency on AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH 1/2] crypto: arm/aes-ce - build for v8 architecture explicitly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH] crypto: cavium/nitrox - Fix cbc ciphers self test failures
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Sebastian Reichel <sre@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - release hmac_buf if ccp_run_sha_cmd fails
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 3/4] KEYS: trusted: Create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 1/4] tpm: Move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- INFO: task hung in cancel_delayed_work_sync
- From: syzbot <syzbot+f39ab8494f6015e62360@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Update for 5.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH] crypto: cavium/nitrox - check assoclen and authsize for gcm(aes) cipher
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- [PATCH] crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- linux-next: manual merge of the crypto tree with the s390 tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- linux-next: manual merge of the crypto tree with the arm-soc tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: erase key after use
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: sun4i-ss: erase key after use
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon - Matching the dma address for dma_pool_free()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon - Fix double free in sec_free_hw_sgl()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- [PATCH 7/7] hwrng: omap3-rom - Use devm hwrng and runtime PM
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 6/7] hwrng: omap3-rom - Use runtime PM instead of custom functions
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 5/7] hwrng: omap3-rom - Update to use standard driver data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 3/7] hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 2/7] hwrng: omap3-rom - Fix missing clock by probing with device tree
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 4/7] hwrng: omap3-rom - Initialize default quality to get data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 1/7] ARM: OMAP2+: Check omap3-rom-rng for GP device instead of HS device
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Sebastian Reichel <sre@xxxxxxxxxx>
- Re: [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Sebastian Reichel <sre@xxxxxxxxxx>
- [PATCH] crypto: ccp - release hmac_buf if ccp_run_sha_cmd fails
- From: Navid Emamdoost <navid.emamdoost@xxxxxxxxx>
- [PATCH 1/6] ARM: OMAP2+: Check omap3-rom-rng for GP device instead of HS device
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 2/6] hwrng: omap3-rom - Fix missing clock by probing with device tree
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 6/6] hwrng: omap3-rom - Use runtime PM instead of custom functions
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 5/6] hwrng: omap3-rom - Update to use standard driver data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 4/6] hwrng: omap3-rom - Initialize default quality to get data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCHv2 3/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/3DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Added more authenc w/ (3)DES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Add HMAC-SHA3 family of authentication algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Add SHA3 family of basic hash algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: Kconfig - Add CRYPTO_SHA3 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Add (HMAC) SHA3 support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Add SM4 based authenc AEAD ciphersuites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- [PATCHv3 1/3] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 2/3] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 3/3] crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: aegis128-neon - use Clang compatible cflags for ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCHv3 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/3DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Added more authenc w/ (3)DES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add HMAC-SHA3 family of authentication algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - Add (HMAC) SHA3 support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Add SHA3 family of basic hash algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: inside-secure - Add supp. for non-Marvell HW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] padata: use unbound workqueues for parallel jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCHv2 7/7] crypto: testmgr - Added testvectors for the rfc3686(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 6/7] crypto: inside-secure - Add support for the rfc3685(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 5/7] crypto: inside-secure - Add support for the cfb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/7] crypto: inside-secure - Add support for the cbc(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/7] crypto: inside-secure - Add support for the ofb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/7] crypto: inside-secure - Add support for the ecb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/7] crypto: inside-secure - Add support for SM4 ciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- testmgr: HMAC-SHA3-224/256 test vector issue
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH] hw_random: move add_early_randomness() out of rng_mutex
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/2] rypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v3 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v3 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- RE: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher - Use chunksize instead of blocksize
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/2] crypto: sun4i-ss: Enable power management
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 7/7] crypto: testmgr - Added testvectors for the rfc3686(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 6/7] crypto: inside-secure - Add support for the rfc3685(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 5/7] crypto: inside-secure - Add support for the cfb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/7] crypto: inside-secure - Add support for the ofb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/7] crypto: inside-secure - Add support for the cbc(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/7] crypto: inside-secure - Add support for SM4 ciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/7] crypto: inside-secure - Add support for the ecb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [cryptodev:master 219/293] drivers/crypto//inside-secure/safexcel.c:840:9: error: implicit declaration of function 'pci_irq_vector'; did you mean 'rcu_irq_enter'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - use the same jr for rng init/exit
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH 2/2] crypto: arm64/gcm-ce - implement 4 way interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: testmgr - add another gcm(aes) testcase
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto: faster GCM-AES for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: "Milton Miller II" <miltonm@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: Crypto driver callback problem
- From: Gary R Hook <ghook@xxxxxxx>
- RE: Crypto driver callback problem
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- linux-next: Fixes tags need some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- RE: Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: Interesting crypto manager behavior
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Yang Li <pku.leo@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix missing break in switch statement
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - fix hash result for VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: algif_skcipher - Use chunksize instead of blocksize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] crypto: caam - use devres to de-initialize the RNG
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [v2 PATCH] crypto: caam - Cast to long first before pointer conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 06/12] crypto: caam - use devres to remove debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 05/12] crypto: caam - use devres to unmap memory
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v6 12/12] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 11/12] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 10/12] tpm: add the null key name as a tpm2 sysfs variable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/12] trusted keys: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 08/12] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v6 07/12] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 06/12] tpm-buf: add tpm_buf_parameters()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 04/12] tpm2-space: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 03/12] tpm-buf: add cursor based functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for the AES-CMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for the AES XCBC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for the AES CBCMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Added support for CRC32
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [cryptodev:master 288/301] drivers/crypto//caam/jr.c:491:22: warning: cast from pointer to integer of different size
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: caam - Cast to long first before pointer conversion
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] random: Use wait_event_freezable() in add_hwgenerator_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/zip - Add missing single_release()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell: Use kzfree rather than its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-ni - use AES library instead of single-use AES cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: caam - Cast to long first before pointer conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - fix missing break in switch statement
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Uri Shir <uri.shir@xxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [cryptodev:master 219/267] drivers/crypto/inside-secure/safexcel.c:1046:24: error: 'PCI_IRQ_MSIX' undeclared; did you mean 'PCI_PRI_CTRL'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] dt-bindings: crypto: samsung: Convert SSS and SlimSSS bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] dt-bindings: rng: exynos4-rng: Convert Exynos PRNG bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 8/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on H6
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 5/9] ARM: dts: sun8i: h3: Add Crypto Engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 7/9] ARM64: dts: allwinner: sun50i: Add crypto engine node on H5
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/9] crypto: add sun8i-ce driver for Allwinner crypto engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: inside-secure - Probe transform record cache RAM sizes
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 5/6] crypto: inside-secure - Base RD fetchcount on actual RD FIFO size
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/6] crypto: inside-secure - Base CD fetchcount on actual CD FIFO size
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/6] crypto: inside-secure - Enable extended algorithms on newer HW
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/6] crypto: inside-secure: Corrected configuration of EIP96_TOKEN_CTRL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/6] crypto: inside-secure - Add EIP97/EIP197 and endianness detection
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/6] crypto: inside-secure - Add supp. for non-Marvell HW
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] crypto: caam - check irq_of_parse_and_map for errors
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 04/12] crypto: caam - dispose of IRQ mapping only after IRQ is freed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH -next] crypto: essiv - Remove unnecessary NULL checks
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 1/5] padata: make flushing work with async users
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH] random: Use wait_event_freezable() in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: timeriomem_rng: relax check on memory resource size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for AES-GCM, AES-CFB, AES-OFB and AES-CCM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Minor code cleanup and optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Minor optimization recognizing CTR is always AES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Made .cra_priority value a define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add AES-XTS cipher support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] crypto: mediatek: move mtk_aes_find_dev() to the right place
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ux500 - Fix COMPILE_TEST warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] padata: make flushing work with async users
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH] crypto: x86/aes-ni - use AES library instead of single-use AES cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Yuehaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] crypto: cavium/zip - Add missing single_release()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- PCI: Add stub pci_irq_vector and others
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Question: kexec() ISO images using encrypted partitions and/or "persistent RAM".
- From: Hunter Nins <hunternins@xxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for the AES XCBC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for the AES-CMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for the AES CBCMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH 3/3] Staging: rtl8723bs: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 0/3] Use kzfree instead of memset() + kfree()
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 1/3] crypto: marvell: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 03/12] crypto: caam - check irq_of_parse_and_map for errors
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 06/12] crypto: caam - use devres to remove debugfs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 04/12] crypto: caam - dispose of IRQ mapping only after IRQ is freed
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 07/12] crypto: caam - use devres to de-initialize the RNG
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 08/12] crypto: caam - use devres to de-initialize QI
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 11/12] crypto: caam - convert caamrng to platform device
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 10/12] crypto: caam - populate platform devices last
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 09/12] crypto: caam - user devres to populate platform devices
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 05/12] crypto: caam - use devres to unmap memory
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 00/12] CAAM bugfixes, small improvements
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- [PATCH v2 17/17] crypto: testmgr - Add additional AES-XTS vectors for covering CTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/17] crypto: testmgr - add test vectors for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/17] crypto: arm/aes-ce - implement ciphertext stealing for CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/17] crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/17] crypto: arm/aes-ce - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/17] crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/17] crypto: arm64/aes - implement support for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/17] crypto: arm64/aes-cts-cbc - move request context data to the stack
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/17] crypto: arm64/aes-cts-cbc-ce - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/17] crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/17] crypto: arm64/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/17] crypto: arm/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/17] crypto: arm/aes-ce - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/17] crypto: arm/aes-ce - switch to 4x interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/17] crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/17] crypto: arm/aes - fix round key prototypes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 058/167] crypto: ccree - add missing inline qualifier
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 056/167] crypto: ccree - fix resume race condition on init
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- crypto: blkcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ablkcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: How to use nonce in DRBG functions.
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: How to use nonce in DRBG functions.
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 9/9] crypto: sha256 - Remove sha256/224_init code duplication
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 8/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 7/9] crypto: n2 - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 6/9] crypto: chelsio - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/9] crypto: arm - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 2/9] crypto: arm64 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/9] crypto: s390 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 4/9] crypto: x86 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- How to use nonce in DRBG functions.
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH V2 3/4] firmware: xilinx: Add ZynqMP aes API for AES functionality
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 2/4] ARM64: zynqmp: Add Xilinix AES node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 0/4] Add Xilinx's ZynqMP AES driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 1/4] dt-bindings: crypto: Add bindings for ZynqMP AES driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- Re: [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hw_random: timeriomem_rng: relax check on memory resource size
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT] Crypto Fixes for 5.3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: "Milton Miller II" <miltonm@xxxxxxxxxx>
- [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 241/242] include/asm-generic/qspinlock.h:65:55: warning: pointer targets in passing argument 2 of 'atomic_try_cmpxchg' differ in signedness
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 219/242] drivers/crypto/inside-secure/safexcel.c:840:9: error: implicit declaration of function 'pci_irq_vector'; did you mean 'rcu_irq_enter'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/4] crypto: inside-secure - Added AES-CFB support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/4] crypto: inside-secure - Added support for basic AES-CCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/4] crypto: inside-secure - Added support for basic AES-GCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/4] crypto: inside-secure - Added AES-OFB support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/4] Add support for AES-GCM, AES-CFB, AES-OFB and AES-CCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Minor code cleanup and optimizations
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Minor optimization recognizing CTR is always AES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Made .cra_priority value a define
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Only enable algorithms advertised by the hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Move static cipher alg & mode settings to init
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add AES-XTS cipher support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - invoke fallback for XTS ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - Fix -Wunused-const-variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: aegis128 - Fix -Wunused-const-variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - use print_hex_dump_debug function to print debug messages
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv5 0/4] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] drivers/crypto - s5p fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix the name of the module in the description of CRYPTO_DEV_PICOXCELL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: Mike Marshall <hubcap@xxxxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v2 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Christophe Leroy <christophe.leroy@xxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]