Linux Crypto
[Prev Page][Next Page]
- Re: [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH] crypto: cavium/nitrox - check assoclen and authsize for gcm(aes) cipher
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- [PATCH] crypto: hisilicon - Fix return value check in hisi_zip_acompress()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- linux-next: manual merge of the crypto tree with the s390 tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- linux-next: manual merge of the crypto tree with the arm-soc tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: erase key after use
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: sun4i-ss: erase key after use
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon - Matching the dma address for dma_pool_free()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon - Fix double free in sec_free_hw_sgl()
- From: Yunfeng Ye <yeyunfeng@xxxxxxxxxx>
- [PATCH 7/7] hwrng: omap3-rom - Use devm hwrng and runtime PM
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 6/7] hwrng: omap3-rom - Use runtime PM instead of custom functions
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 5/7] hwrng: omap3-rom - Update to use standard driver data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 3/7] hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 2/7] hwrng: omap3-rom - Fix missing clock by probing with device tree
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCHv2 0/7] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 4/7] hwrng: omap3-rom - Initialize default quality to get data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 1/7] ARM: OMAP2+: Check omap3-rom-rng for GP device instead of HS device
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Sebastian Reichel <sre@xxxxxxxxxx>
- Re: [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Sebastian Reichel <sre@xxxxxxxxxx>
- [PATCH] crypto: ccp - release hmac_buf if ccp_run_sha_cmd fails
- From: Navid Emamdoost <navid.emamdoost@xxxxxxxxx>
- [PATCH 1/6] ARM: OMAP2+: Check omap3-rom-rng for GP device instead of HS device
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 2/6] hwrng: omap3-rom - Fix missing clock by probing with device tree
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 6/6] hwrng: omap3-rom - Use runtime PM instead of custom functions
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 5/6] hwrng: omap3-rom - Update to use standard driver data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 4/6] hwrng: omap3-rom - Initialize default quality to get data
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 3/6] hwrng: omap3-rom - Call clk_prepare() on init and exit only
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCH 0/6] Non-urgent fixes and improvments for omap3-rom-rng
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- [PATCHv2 3/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/3DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Added more authenc w/ (3)DES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Add HMAC-SHA3 family of authentication algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Add SHA3 family of basic hash algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: Kconfig - Add CRYPTO_SHA3 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Add (HMAC) SHA3 support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Add SM4 based authenc AEAD ciphersuites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- [PATCHv3 1/3] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 2/3] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 3/3] crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: Kconfig - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: aegis128-neon - use Clang compatible cflags for ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCHv3 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for authenc HMAC-SHA2/3DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Added more authenc w/ (3)DES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add HMAC-SHA3 family of authentication algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - Add (HMAC) SHA3 support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Add SHA3 family of basic hash algorithms
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: inside-secure - Add supp. for non-Marvell HW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] padata: use unbound workqueues for parallel jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCHv2 7/7] crypto: testmgr - Added testvectors for the rfc3686(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 6/7] crypto: inside-secure - Add support for the rfc3685(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 5/7] crypto: inside-secure - Add support for the cfb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/7] crypto: inside-secure - Add support for the cbc(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/7] crypto: inside-secure - Add support for the ofb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/7] crypto: inside-secure - Add support for the ecb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/7] crypto: inside-secure - Add support for SM4 ciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- testmgr: HMAC-SHA3-224/256 test vector issue
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Chen-Yu Tsai <wens@xxxxxxxx>
- Re: [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH] hw_random: move add_early_randomness() out of rng_mutex
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 0/2] rypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [PATCH v3 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v3 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v3 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- RE: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher - Use chunksize instead of blocksize
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/2] crypto: sun4i-ss: enable pm_runtime
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] crypto: sun4i-ss: simplify enable/disable of the device
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/2] crypto: sun4i-ss: Enable power management
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 7/7] crypto: testmgr - Added testvectors for the rfc3686(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 6/7] crypto: inside-secure - Add support for the rfc3685(ctr(sm4)) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 5/7] crypto: inside-secure - Add support for the cfb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/7] crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/7] crypto: inside-secure - Add support for the ofb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/7] crypto: inside-secure - Add support for the cbc(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/7] crypto: inside-secure - Add support for SM4 ciphers
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/7] crypto: inside-secure - Add support for the ecb(sm4) skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Use common tpm_buf for asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [cryptodev:master 219/293] drivers/crypto//inside-secure/safexcel.c:840:9: error: implicit declaration of function 'pci_irq_vector'; did you mean 'rcu_irq_enter'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - use the same jr for rng init/exit
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 3/3] crypto: testmgr - Added testvectors for the hmac(sm3) ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for HMAC-SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for basic SM3 ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for (HMAC) SM3
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH 2/2] crypto: arm64/gcm-ce - implement 4 way interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: testmgr - add another gcm(aes) testcase
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto: faster GCM-AES for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: "Milton Miller II" <miltonm@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: Crypto driver callback problem
- From: Gary R Hook <ghook@xxxxxxx>
- RE: Crypto driver callback problem
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Added support for the CHACHA20 skcipher
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure: Add support for the Chacha20 skcipher and the Chacha20-Poly1305 AEAD suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- linux-next: Fixes tags need some work in the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- RE: Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: Interesting crypto manager behavior
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Interesting crypto manager behavior
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Yang Li <pku.leo@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix missing break in switch statement
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - fix hash result for VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: algif_skcipher - Use chunksize instead of blocksize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] crypto: caam - use devres to de-initialize the RNG
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- [v2 PATCH] crypto: caam - Cast to long first before pointer conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 06/12] crypto: caam - use devres to remove debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 05/12] crypto: caam - use devres to unmap memory
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v2 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v2 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v6 12/12] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 11/12] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 10/12] tpm: add the null key name as a tpm2 sysfs variable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/12] trusted keys: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 08/12] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v6 07/12] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 06/12] tpm-buf: add tpm_buf_parameters()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 04/12] tpm2-space: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 03/12] tpm-buf: add cursor based functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for the AES-CMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for the AES XCBC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for the AES CBCMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Added support for CRC32
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [cryptodev:master 288/301] drivers/crypto//caam/jr.c:491:22: warning: cast from pointer to integer of different size
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: caam - Cast to long first before pointer conversion
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] random: Use wait_event_freezable() in add_hwgenerator_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/zip - Add missing single_release()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell: Use kzfree rather than its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-ni - use AES library instead of single-use AES cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] CAAM bugfixes, small improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: caam - Cast to long first before pointer conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - fix missing break in switch statement
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: ccree - enable CTS support in AES-XTS
- From: Uri Shir <uri.shir@xxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [cryptodev:master 219/267] drivers/crypto/inside-secure/safexcel.c:1046:24: error: 'PCI_IRQ_MSIX' undeclared; did you mean 'PCI_PRI_CTRL'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] dt-bindings: crypto: samsung: Convert SSS and SlimSSS bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] dt-bindings: rng: exynos4-rng: Convert Exynos PRNG bindings to json-schema
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 1/9] crypto: Add allwinner subdirectory
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/9] crypto: Add Allwinner sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/9] ARM: dts: sun8i: r40: add crypto engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 8/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on H6
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 5/9] ARM: dts: sun8i: h3: Add Crypto Engine node
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 9/9] sunxi_defconfig: add new crypto options
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 7/9] ARM64: dts: allwinner: sun50i: Add crypto engine node on H5
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 6/9] ARM64: dts: allwinner: sun50i: Add Crypto Engine node on A64
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/9] dt-bindings: crypto: Add DT bindings documentation for sun8i-ce Crypto Engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/9] crypto: add sun8i-ce driver for Allwinner crypto engine
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCHv3] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: inside-secure - Probe transform record cache RAM sizes
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 5/6] crypto: inside-secure - Base RD fetchcount on actual RD FIFO size
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/6] crypto: inside-secure - Base CD fetchcount on actual CD FIFO size
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/6] crypto: inside-secure - Enable extended algorithms on newer HW
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/6] crypto: inside-secure: Corrected configuration of EIP96_TOKEN_CTRL
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/6] crypto: inside-secure - Add EIP97/EIP197 and endianness detection
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/6] crypto: inside-secure - Add supp. for non-Marvell HW
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon - avoid unused function warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - fix uninitialized-variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] crypto: caam - check irq_of_parse_and_map for errors
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 04/12] crypto: caam - dispose of IRQ mapping only after IRQ is freed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH -next] crypto: essiv - Remove unnecessary NULL checks
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCHv2] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [v2 PATCH] crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v3 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 1/5] padata: make flushing work with async users
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH] random: Use wait_event_freezable() in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: timeriomem_rng: relax check on memory resource size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for AES-GCM, AES-CFB, AES-OFB and AES-CCM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Minor code cleanup and optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Minor optimization recognizing CTR is always AES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Made .cra_priority value a define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - Add AES-XTS cipher support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] crypto: mediatek: move mtk_aes_find_dev() to the right place
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ux500 - Fix COMPILE_TEST warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] padata: make flushing work with async users
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH] crypto: x86/aes-ni - use AES library instead of single-use AES cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: PCI: Add stub pci_irq_vector and others
- From: Yuehaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] crypto: cavium/zip - Add missing single_release()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- PCI: Add stub pci_irq_vector and others
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Question: kexec() ISO images using encrypted partitions and/or "persistent RAM".
- From: Hunter Nins <hunternins@xxxxxxxxx>
- Re: [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Added support for the AES XCBC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Added support for the AES-CMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Added support for the AES CBCMAC ahash
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add support for the CBCMAC
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH 3/3] Staging: rtl8723bs: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 2/3] iommu/pamu: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 0/3] Use kzfree instead of memset() + kfree()
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- [PATCH 1/3] crypto: marvell: Use kzfree rather than its implementation
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 03/12] crypto: caam - check irq_of_parse_and_map for errors
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 01/12] crypto: caam - make sure clocks are enabled first
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 02/12] crypto: caam - use devres to unmap JR's registers
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 06/12] crypto: caam - use devres to remove debugfs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 04/12] crypto: caam - dispose of IRQ mapping only after IRQ is freed
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 07/12] crypto: caam - use devres to de-initialize the RNG
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 08/12] crypto: caam - use devres to de-initialize QI
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 12/12] crypto: caam - change JR device ownership scheme
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 11/12] crypto: caam - convert caamrng to platform device
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 10/12] crypto: caam - populate platform devices last
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 09/12] crypto: caam - user devres to populate platform devices
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 05/12] crypto: caam - use devres to unmap memory
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH 00/12] CAAM bugfixes, small improvements
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- [PATCH v2 17/17] crypto: testmgr - Add additional AES-XTS vectors for covering CTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/17] crypto: testmgr - add test vectors for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/17] crypto: arm/aes-ce - implement ciphertext stealing for CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/17] crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/17] crypto: arm/aes-ce - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/17] crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/17] crypto: arm64/aes - implement support for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/17] crypto: arm64/aes-cts-cbc - move request context data to the stack
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/17] crypto: arm64/aes-cts-cbc-ce - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/17] crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/17] crypto: arm64/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/17] crypto: arm/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/17] crypto: arm/aes-ce - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/17] crypto: arm/aes-ce - switch to 4x interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/17] crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/17] crypto: arm/aes - fix round key prototypes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 058/167] crypto: ccree - add missing inline qualifier
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 056/167] crypto: ccree - fix resume race condition on init
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: crypto: skcipher - Unmap pages after an external error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- crypto: blkcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ablkcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm64: Use PTR_ERR_OR_ZERO rather than its implementation.
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- crypto: skcipher - Unmap pages after an external error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: How to use nonce in DRBG functions.
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH v2 -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: inside-secure - Fix build error without CONFIG_PCI
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: How to use nonce in DRBG functions.
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 9/9] crypto: sha256 - Remove sha256/224_init code duplication
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 8/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 7/9] crypto: n2 - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 6/9] crypto: chelsio - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 5/9] crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/9] crypto: arm - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 2/9] crypto: arm64 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/9] crypto: s390 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 4/9] crypto: x86 - Rename functions to avoid conflict with crypto/sha256.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 0/9] crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- How to use nonce in DRBG functions.
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH V2 3/4] firmware: xilinx: Add ZynqMP aes API for AES functionality
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 2/4] ARM64: zynqmp: Add Xilinix AES node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 4/4] crypto: Add Xilinx AES driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 0/4] Add Xilinx's ZynqMP AES driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [PATCH V2 1/4] dt-bindings: crypto: Add bindings for ZynqMP AES driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- Re: [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hw_random: timeriomem_rng: relax check on memory resource size
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT] Crypto Fixes for 5.3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: "Milton Miller II" <miltonm@xxxxxxxxxx>
- [PATCH] arm64: dts: imx8mq: Add CAAM node
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 241/242] include/asm-generic/qspinlock.h:65:55: warning: pointer targets in passing argument 2 of 'atomic_try_cmpxchg' differ in signedness
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 219/242] drivers/crypto/inside-secure/safexcel.c:840:9: error: implicit declaration of function 'pci_irq_vector'; did you mean 'rcu_irq_enter'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/4] crypto: inside-secure - Added AES-CFB support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/4] crypto: inside-secure - Added support for basic AES-CCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/4] crypto: inside-secure - Added support for basic AES-GCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/4] crypto: inside-secure - Added AES-OFB support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/4] Add support for AES-GCM, AES-CFB, AES-OFB and AES-CCM
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Minor code cleanup and optimizations
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Minor optimization recognizing CTR is always AES
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Made .cra_priority value a define
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - Only enable algorithms advertised by the hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - Move static cipher alg & mode settings to init
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - Add AES-XTS cipher support
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - invoke fallback for XTS ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - Fix -Wunused-const-variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: aegis128 - Fix -Wunused-const-variable warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - use print_hex_dump_debug function to print debug messages
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv5 0/4] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] drivers/crypto - s5p fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix the name of the module in the description of CRYPTO_DEV_PICOXCELL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: Mike Marshall <hubcap@xxxxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v2 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 13/15] crypto: testmgr - convert hash testing to use testvec_configs
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: net/tls(TLS_SW): double free in tls_tx_records
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/5] padata: remove reorder_objects
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 5/5] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 4/5] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 0/5] padata flushing and CPU hotplug fixes
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 1/5] padata: make flushing work with async users
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v2 3/5] padata: get rid of padata_remove_cpu() for real
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- net/tls(TLS_SW): double free in tls_tx_records
- From: Pooja Trivedi <poojatrivedi@xxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: mediatek: fix incorrect crypto key setting
- From: John Crispin <john@xxxxxxxxxxx>
- [PATCH 3/5] crypto: mediatek: only treat EBUSY as transient if backlog
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 5/5] crypto: mediatek: fix incorrect crypto key setting
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 2/5] crypto: mediatek: fix uninitialized value of gctx->textlen
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 4/5] crypto: mediatek: add support to OFB/CFB mode
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- [PATCH 1/5] crypto: mediatek: move mtk_aes_find_dev() to the right place
- From: Vic Wu <vic.wu@xxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: maowenan <maowenan@xxxxxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Fwd: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Mukul Joshi <mukuljoshi2011@xxxxxxxxx>
- Fwd: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Mukul Joshi <mukuljoshi2011@xxxxxxxxx>
- Re: [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next] crypto: hisilicon: select CRYPTO_LIB_DES while compiling SEC driver
- From: Mao Wenan <maowenan@xxxxxxxxxx>
- Re: [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Data size error interrupt with Talitos driver on 4.9.82 kernel
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: linux-next: build warning after merge of the crypto tree
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Elon Zhang <zhangzj@xxxxxxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: cbc mode broken in rk3288 driver
- From: Elon Zhang <zhangzj@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: linux-next: manual merge of the crypto tree with Linus' tree
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- linux-next: build warning after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- linux-next: manual merge of the crypto tree with Linus' tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: Satya Tangirala <satyat@xxxxxxxxxx>
- Re: [PATCH 1/9] crypt: Add diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] crypto: ccp - invoke fallback for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: atmel - Fix -Wunused-const-variable warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: aegis128 - Fix -Wunused-const-variable warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: n2/des - fix build breakage after DES updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: talitos - Fix build warning in aead_des3_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH cryptodev buildfix] crypto: n2/des - fix build breakage after DES updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 181/206] drivers/crypto/n2_core.c:761:46: error: 'tfm' undeclared; did you mean 'tm'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH cryptodev buildfix] crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 198/206] arch/s390/crypto/aes_s390.c:589:41: error: 'XTS_BLOCKSIZE' undeclared; did you mean 'XTS_BLOCK_SIZE'?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/9] crypt: Add diskcipher
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx/xts - use fallback for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s390/xts-aes - invoke fallback for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/xts - implement support for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/30] crypto: DES/3DES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: nx crypto: Fix typo in a filepath
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Ignore unconfigured CCP device on suspend/resume
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: mtk-rng: Add documentation for MT8516
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 17/17] crypto: testmgr - Add additional AES-XTS vectors for covering CTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 15/17] crypto: arm/aes-ce - implement ciphertext stealing for CBC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 16/17] crypto: testmgr - add test vectors for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 14/17] crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 13/17] crypto: arm/aes-ce - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/17] crypto: arm64/aes - implement support for XTS ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 12/17] crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/17] crypto: arm64/aes-cts-cbc - move request context data to the stack
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/17] crypto: arm64/aes-cts-cbc-ce - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/17] crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/17] crypto: skcipher - add the ability to abort a skcipher walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/17] crypto: arm64/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/17] crypto: arm/aes-neonbs - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/17] crypto: arm/aes-ce - switch to 4x interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/17] crypto: arm/aes-ce - replace tweak mask literal with composition
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/17] crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/17] crypto: arm/aes - fix round key prototypes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 00/17] crypto: arm/aes - XTS ciphertext stealing and other updates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 2/4] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 5/9] block: support diskcipher
- From: Jens Axboe <axboe@xxxxxxxxx>
- [GIT PULL v2] inside-secure: add new "mini" firmware for the EIP197 driver
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] dm crypt: support diskcipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] mmc: dw_mmc: support crypto operation
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 1/9] crypt: Add diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 5/9] block: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 7/9] fscrypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 8/9] fs: ext4: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 9/9] fs: f2fs: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 6/9] dm crypt: support diskcipher
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 4/9] mmc: dw_mmc-exynos: support FMP
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 2/9] crypto: fmp: add Flash Memory Protector driver
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- [PATCH 0/9] Flash Memory Protector Support
- From: "boojin.kim" <boojin.kim@xxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v8 13/16] crypto: caam - select DMA address size at runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 02/16] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 01/16] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 05/16] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 04/16] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 06/16] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 08/16] crypto: caam - share definition for MAX_SDLEN
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 10/16] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 13/16] crypto: caam - select DMA address size at runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 14/16] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 11/16] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 09/16] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 07/16] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 15/16] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 16/16] arm64: dts: imx8mq: Add CAAM node
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 12/16] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 03/16] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v8 00/16] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- cbc mode broken in rk3288 driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Extend patterns for Samsung SoC, Security Subsystem and clock drivers
- From: Sylwester Nawrocki <s.nawrocki@xxxxxxxxxxx>
- Re: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- RE: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - use print_hex_dump_debug function to print debug messages
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Extend patterns for Samsung SoC, Security Subsystem and clock drivers
- From: Chanwoo Choi <cw00.choi@xxxxxxxxxxx>
- Re: [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Ignore unconfigured CCP device on suspend/resume
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_sendmsg
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 2/2] staging: rtl8192e: rtllib_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Larry Finger <Larry.Finger@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- [PATCHv5 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv5 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] random: Support freezable kthreads in add_hwgenerator_randomness()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- RE: [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p - use correct block size of 1 for ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: s5p - deal gracefully with bogus input sizes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] drivers/crypto - s5p fixes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 6/6] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 5/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 4/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 3/6] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 2/6] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v13 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm64/aegis128 - use explicit vector load for permute vectors
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]