Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: net/tls(TLS_SW): double free in tls_tx_records
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/5] padata: remove reorder_objects
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 5/5] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 4/5] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 0/5] padata flushing and CPU hotplug fixes
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 1/5] padata: make flushing work with async users
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 3/5] padata: get rid of padata_remove_cpu() for real
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- net/tls(TLS_SW): double free in tls_tx_records
- From: Pooja Trivedi <poojatrivedi@xxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: mediatek: fix incorrect crypto key setting
- From: John Crispin <john@xxxxxxxxxxx>
- [PATCH 3/5] crypto: mediatek: only treat EBUSY as transient if backlog
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 5/5] crypto: mediatek: fix incorrect crypto key setting
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 2/5] crypto: mediatek: fix uninitialized value of gctx->textlen
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 4/5] crypto: mediatek: add support to OFB/CFB mode
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 1/5] crypto: mediatek: move mtk_aes_find_dev() to the right place
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: maowenan <maowenan@xxxxxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Fwd: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Mukul Joshi <mukuljoshi2011@xxxxxxxxx>
- Fwd: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Mukul Joshi <mukuljoshi2011@xxxxxxxxx>
- Re: [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: linux-next: build warning after merge of the crypto tree
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Elon Zhang <zhangzj@xxxxxxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Elon Zhang <zhangzj@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: linux-next: manual merge of the crypto tree with Linus' tree
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- linux-next: build warning after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- linux-next: manual merge of the crypto tree with Linus' tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: Satya Tangirala <satyat@xxxxxxxxxx>
- Re: [PATCH 1/9] crypt: Add diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] crypto: ccp - invoke fallback for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: atmel - Fix -Wunused-const-variable warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: aegis128 - Fix -Wunused-const-variable warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: n2/des - fix build breakage after DES updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: talitos - Fix build warning in aead_des3_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH cryptodev buildfix] crypto: n2/des - fix build breakage after DES updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 181/206] drivers/crypto/n2_core.c:761:46: error: 'tfm' undeclared; did you mean 'tm'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 198/206] arch/s390/crypto/aes_s390.c:589:41: error: 'XTS_BLOCKSIZE' undeclared; did you mean 'XTS_BLOCK_SIZE'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/9] crypt: Add diskcipher
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx/xts - use fallback for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s390/xts-aes - invoke fallback for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/xts - implement support for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/30] crypto: DES/3DES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: nx crypto: Fix typo in a filepath
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Ignore unconfigured CCP device on suspend/resume
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: mtk-rng: Add documentation for MT8516
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 17/17] crypto: testmgr - Add additional AES-XTS vectors for covering CTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 15/17] crypto: arm/aes-ce - implement ciphertext stealing for CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 16/17] crypto: testmgr - add test vectors for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 14/17] crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 13/17] crypto: arm/aes-ce - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/17] crypto: arm64/aes - implement support for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 12/17] crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/17] crypto: arm64/aes-cts-cbc - move request context data to the stack
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/17] crypto: arm64/aes-cts-cbc-ce - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/17] crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/17] crypto: arm64/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/17] crypto: arm/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/17] crypto: arm/aes-ce - switch to 4x interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/17] crypto: arm/aes-ce - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/17] crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/17] crypto: arm/aes - fix round key prototypes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 2/4] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: Jens Axboe <axboe@xxxxxxxxx>
- [GIT PULL v2] inside-secure: add new "mini" firmware for the EIP197 driver
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] mmc: dw_mmc: support crypto operation
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 1/9] crypt: Add diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 7/9] fscrypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 8/9] fs: ext4: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 9/9] fs: f2fs: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 4/9] mmc: dw_mmc-exynos: support FMP
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 2/9] crypto: fmp: add Flash Memory Protector driver
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 0/9] Flash Memory Protector Support
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v8 13/16] crypto: caam - select DMA address size at runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 02/16] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 01/16] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 05/16] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 04/16] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 06/16] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 08/16] crypto: caam - share definition for MAX_SDLEN
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 10/16] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 13/16] crypto: caam - select DMA address size at runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 14/16] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 11/16] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 09/16] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 07/16] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 15/16] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 16/16] arm64: dts: imx8mq: Add CAAM node
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 12/16] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 03/16] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Extend patterns for Samsung SoC, Security Subsystem and clock drivers
- From: Sylwester Nawrocki <s.nawrocki@xxxxxxxxxxx>
- Re: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- RE: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - use print_hex_dump_debug function to print debug messages
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Extend patterns for Samsung SoC, Security Subsystem and clock drivers
- From: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
- Re: [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Ignore unconfigured CCP device on suspend/resume
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_sendmsg
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 2/2] staging: rtl8192e: rtllib_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Larry Finger <Larry.Finger@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- [PATCHv5 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- RE: [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] drivers/crypto - s5p fixes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 4/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 3/6] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 2/6] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: picoxcell - Fix the name of the module in the description of CRYPTO_DEV_PICOXCELL
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Extend patterns for Samsung SoC, Security Subsystem and clock drivers
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Avi Fishman <avifishman70@xxxxxxxxx>
- [PATCH v2 3/7] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: sha256_generic - Switch to the generic lib/crypto/sha256.c lib code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: sha256 - Add sha224 support to sha256 library code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: sha256 - Make lib/crypto/sha256.c suitable for generic use
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: sha256 - Use get/put_unaligned_be32 to get input, memzero_explicit
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: sha256_generic - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: sha256 - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/6] crypto: sha256 - Use get_unaligned_be32 to get input, memzero_explicit
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: sha256 - Make lib/crypto/sha256.c suitable for generic use
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 4/6] crypto: sha256 - Use get_unaligned_be32 to get input, memzero_explicit
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 2/6] crypto: sha256_generic - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/6] crypto: sha256 - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 0/6] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] crypto: vmx/xts - use fallback for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: s390/xts-aes - invoke fallback for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto: x86/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: XTS self test fail
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: XTS self test fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- XTS self test fail
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] Use ccm(aes) aead transform in staging drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/2] staging: rtl8192e: rtllib_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] staging: rtl8192u: ieee80211: ieee80211_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/2] Use ccm(aes) aead transform in staging drivers
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [v3 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [cryptodev:master 145/162] drivers/crypto/hisilicon/qm.c:350:26: warning: format '%p' expects argument of type 'void *', but argument 6 has type 'dma_addr_t {aka long long unsigned int}'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [v3 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto driver callback problem
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v12 4/4] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 2/4] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 3/4] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: aegis128 followup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: streebog - remove two unused variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: crypto_engine: Fix Sphinx warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: cavium/nitrox - Allocate asymmetric crypto command queues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - Use refcount_t for refcount
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi - execute library only on DPAA 1.x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [PATCH v5 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 01/30] crypto: des/3des_ede - add new helpers to verify keys
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: chtls - use 'skb_put_zero()' instead of re-implementing it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/20] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v11 4/4] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 3/4] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 2/4] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 1/5] crypto: hisilicon - fix kbuild warnings
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon - init curr_sgl_dma to fix compile warning
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon - add missing single_release
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [dm-devel] [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] MAINTAINERS: nx crypto: Fix typo in a filepath
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH v2 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v8 20/20] fscrypt: document the new ioctls and policy version
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 15/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 14/20] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 08/20] fscrypt: rename keyinfo.c to keysetup.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 07/20] fscrypt: move v1 policy key setup to keysetup_v1.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 06/20] fscrypt: refactor key setup code in preparation for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 05/20] fscrypt: rename fscrypt_master_key to fscrypt_direct_key
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v7 02/15] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 03/15] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 04/15] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 05/15] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 06/15] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 07/15] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 10/15] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 12/15] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 14/15] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 13/15] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 15/15] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 11/15] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 09/15] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 08/15] crypto: caam - share definition for MAX_SDLEN
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 01/15] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v10 7/7] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 6/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 4/7] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 5/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:322:2: error: impossible constraint in 'asm'
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:338:2: note: in expansion of macro 'dev_dbg'
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] crypto: aegis128 followup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v9 7/7] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 6/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 4/7] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 5/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 2/2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: XTS template wrapping question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: XTS template wrapping question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: streebog - remove two unused variables
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:322:2: error: impossible constraint in 'asm'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:338:2: note: in expansion of macro 'dev_dbg'
- From: kbuild test robot <lkp@xxxxxxxxx>
- XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 20/41] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- RE: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH -next] crypto: streebog - remove two unused variables
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 00/12] crypto: use devm_platform_ioremap_resource() to simplify code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: ccp - Remove unnecessary includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: Reduce default RT priority
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/14] crypto: caam - fixes for kernel v5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto:ccp - Clean up and exit correctly on allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/57] crypto: Remove dev_err() usage after platform_get_irq()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Log an error message when ccp-crypto fails to load
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: ccree: aead fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AEAD question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] Documentation: crypto: crypto_engine: Fix Sphinx warning
- From: Jonathan Neuschäfer <j.neuschaefer@xxxxxxx>
- RE: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: "Weiny, Ira" <ira.weiny@xxxxxxxxx>
- [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 2/2] crypto: cavium/nitrox - Configure asymmetric queue manager Hardware unit
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- [PATCH 1/2] crypto: cavium/nitrox - Allocate asymmetric crypto command queues
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 09/28] x86/asm: annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [PATCH 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: cryptd - Use refcount_t for refcount
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: chtls - use 'skb_put_zero()' instead of re-implementing it
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 10/41] media/ivtv: convert put_page() to put_user_page*()
- From: Hans Verkuil <hverkuil-cisco@xxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: Hans Verkuil <hverkuil-cisco@xxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: Sakari Ailus <sakari.ailus@xxxxxxxxxxxxxxx>
- [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- [PATCH v3 02/41] drivers/gpu/drm/via: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 04/41] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 05/41] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 07/41] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 08/41] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 10/41] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 09/41] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 06/41] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 01/41] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 12/41] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 14/41] vmci: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 15/41] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 16/41] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 18/41] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 19/41] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 21/41] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 23/41] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 26/41] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 27/41] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 30/41] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 31/41] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 34/41] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 35/41] kernel/events/core.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 36/41] fs/binfmt_elf: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 39/41] mm/mlock.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 40/41] mm/mempolicy.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 41/41] mm/ksm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 37/41] security/tomoyo: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 32/41] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 33/41] fs/nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 29/41] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 28/41] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 22/41] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 20/41] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 17/41] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 25/41] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 24/41] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 13/41] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 03/41] net/xdp: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- Re: [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH v8 12/20] fscrypt: add an HKDF-SHA512 implementation
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFCv2 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccp - Remove unnecessary linux/pci.h include
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp - Include DMA declarations explicitly
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC/RFT v3 3/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 0/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv4 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCHv4 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/2] md/dm-crypt - restrict EBOIV to cbc(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/2] dm-crypt: get rid of cipher API for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCH v4 02/30] crypto: s390/des - switch to new verification routines
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 23/30] crypto: talitos/des - switch to new verification routines
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]