Linux Crypto
[Prev Page][Next Page]
- [PATCH v4 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 01/30] crypto: des/3des_ede - add new helpers to verify keys
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/34] drm/i915: convert put_page() to put_user_page*()
- From: Rodrigo Vivi <rodrigo.vivi@xxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v8 01/20] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 05/20] fscrypt: rename fscrypt_master_key to fscrypt_direct_key
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 06/20] fscrypt: refactor key setup code in preparation for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 04/20] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 02/20] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 08/20] fscrypt: rename keyinfo.c to keysetup.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 11/20] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 09/20] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 07/20] fscrypt: move v1 policy key setup to keysetup_v1.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 16/20] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 17/20] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 14/20] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 18/20] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 15/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 20/20] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 19/20] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 12/20] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 03/20] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 00/20] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- [PATCH] dt-bindings: rng: mtk-rng: Add documentation for MT8516
- From: Fabien Parent <fparent@xxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam/qi - execute library only on DPAA 1.x
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: caam/qi - execute library only on DPAA 1.x
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [RFCv2 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH -next 03/12] crypto: exynos - use devm_platform_ioremap_resource() to simplify code
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCHv3 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv3 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v2 31/34] fs/nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- [PATCH v2 00/34] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 04/34] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 03/34] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 06/34] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 05/34] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 09/34] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 07/34] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 08/34] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 10/34] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 11/34] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 12/34] vmci: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 13/34] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 14/34] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 17/34] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 19/34] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 18/34] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 20/34] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 21/34] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 22/34] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 23/34] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 25/34] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 24/34] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 27/34] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 29/34] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 28/34] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 30/34] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 32/34] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 31/34] fs/nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 34/34] fs/binfmt_elf: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 33/34] kernel/events/core.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [f2fs-dev] [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Chao Yu <chao@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH -next 07/12] crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/34] genwqe: convert put_page() to put_user_page*()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- [PATCH 1/2] crypto: ccp - Include DMA declarations explicitly
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH 2/2] crypto: ccp - Remove unnecessary linux/pci.h include
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH 0/2] crypto: ccp - Remove unnecessary includes
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 03/34] net/ceph: convert put_page() to put_user_page*()
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next 05/12] crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH -next 09/12] crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- RE: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: "Weiny, Ira" <ira.weiny@xxxxxxxxx>
- [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 2/3] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 1/3] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/3] crypto: aegis128 followup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: Keith Busch <keith.busch@xxxxxxxxx>
- [PATCH -next 06/12] crypto: mediatek - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 05/12] crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 03/12] crypto: exynos - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 02/12] crypto: ccp - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 01/12] crypto: artpec6 - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 04/12] crypto: img-hash - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 07/12] crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 09/12] crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 12/12] crypto: qcom-rng - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 11/12] crypto: qce - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 10/12] crypto: stm32 - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 08/12] crypto: sunxi-ss - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 00/12] crypto: use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- [PATCH 4.9 082/223] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 098/223] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 068/158] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: Joonas Lahtinen <joonas.lahtinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- RE: [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v5] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 3/7] crypto: hisilicon - add HiSilicon ZIP accelerator support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: hisilicon - add debugfs for ZIP and QM
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 1/7] crypto: hisilicon - add queue management driver for HiSilicon QM module
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 2/7] crypto: hisilicon - add hardware SGL support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 4/7] crypto: hisilicon - add SRIOV support for ZIP
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 7/7] MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 5/7] Documentation: Add debugfs doc for hisi_zip
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 0/3] AES GCM fixes for the CCP crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - defer probing until QMan is available
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: timeriomem - add include guard to timeriomem-rng.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy: build without sanitizer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove redundant #ifdef in crypto_yield()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: add header include guards
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v4] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 14/34] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 32/34] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 30/34] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 17/34] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 25/34] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 19/34] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 22/34] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 23/34] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 18/34] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 21/34] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 24/34] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 04/34] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 08/34] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 09/34] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 07/34] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 27/34] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 10/34] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 05/34] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH 28/34] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 11/34] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 03/34] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 29/34] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH 12/34] vmci: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- [PATCH 33/34] kernel/events/core.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 34/34] fs/binfmt_elf: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 13/34] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- Re: [PATCH v4 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [RFC 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [RFC 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- [PATCH 3/5] crypto: Reduce default RT priority
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- Re: [f2fs-dev] [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [f2fs-dev] [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto:ccp - Return from init on allocation failure
- From: Gary R Hook <ghook@xxxxxxx>
- Sent out some incorrect patch mails for crypto:inside-secure, please ignore
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v5 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s390/aes - fix name clash after AES library refactor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH for-4.14.y 3/3] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto:ccp - Clean up and exit correctly on allocation failure
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: Crypto API skcipher key size question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH for-4.14.y 3/3] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Amit Pundir <amit.pundir@xxxxxxxxxx>
- Re: [PATCH v5 13/29] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 13/29] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v8 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto:ccp - Return from init on allocation failure
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v6 05/57] crypto: Remove dev_err() usage after platform_get_irq()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v8 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Crypto API skcipher key size question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v4] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - Ignore tag length when decrypting GCM ciphertext
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Add support for valid authsize values less than 16
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Fix oops by properly managing allocated structures
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 0/3] AES GCM fixes for the CCP crypto driver
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - Cosmetic fixes for readability
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 2/3] crypto/sha256: Export a sha256_{init,update,final}_direct() API
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 1/3] crypto/sha256: Factor out the parts of base API that don't use shash_desc
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 0/3] Making a secure hash function avaiable during early boot?
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v4 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v4 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v4 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3] crypto: gcm - restrict assoclen for rfc4543
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v4 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Backlog support for CAAM?
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 15/16] ubifs: wire up new fscrypt ioctls
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH 4.14 147/293] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.14 126/293] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: ccp - Log an error message when ccp-crypto fails to load
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] crypto: ccree: use std api sg_zero_buffer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ccree: use the full crypt length value
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: ccree: aead fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto/aegis128-core.c:19:22: fatal error: asm/simd.h: No such file or directory
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 13/16] ext4: wire up new fscrypt ioctls
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] hwrng: timeriomem - add include guard to timeriomem-rng.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: gcm.c question regarding the rfc4106 cipher suite
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: Remove redundant #ifdef in crypto_yield()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: gcm.c question regarding the rfc4106 cipher suite
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: s390/aes - fix name clash after AES library refactor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 18/80] arch/s390/crypto/aes_s390.c:111:13: error: conflicting types for 'aes_encrypt'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Move static cipher alg & mode settings to init
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- gcm.c question regarding the rfc4106 cipher suite
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 06/14] crypto: caam - check assoclen
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 05/14] crypto: caam - check authsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 04/14] crypto: caam - check key length
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH AUTOSEL 5.2 73/85] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCHv2 1/3] Kconfig: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add tests for lzo-rle
- From: Dave Rodgman <dave.rodgman@xxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - add comment and improve help text
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: purge get_cpu and reorder_via_wq from padata_do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccree - check assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Reduce maximum stack usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Improve system log messaging in ccp-crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Add support for loading asymmetric crypto firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Add module parameters to control CCP activation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ux500: Use spinlock_t instead of struct spinlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - add more AEAD ciphersuites
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] crypto: CAESAR final portfolio follow-up
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add tests for lzo-rle
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/32] crypto: AES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: inside-secure - fix cryptomgr extratests issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: ccree: cleanups, fixes and TEE FIPS support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: ccree - fix spelling mistake "configration" -> "configuration"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ux500: Use spinlock_t instead of struct spinlock
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 10/10] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [RFC 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 3/4] MAINTAINERS: Add myself as maintainer of amlogic crypto
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 4/4] ARM64: dts: amlogic: adds crypto hardware node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH] hwrng: Use device-managed registration API
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Backlog support for CAAM?
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4.19 218/271] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 182/271] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 5.2 346/413] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 250/371] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 315/371] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.2 274/413] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: jitterentropy: build without sanitizer
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH v2] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Nishka Dasgupta <nishkadg.linux@xxxxxxxxx>
- Re: [PATCH] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 2/2] crypto: user - fix potential warnings in cryptouser.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: add header include guards
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Nishka Dasgupta <nishkadg.linux@xxxxxxxxx>
- [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RESEND PATCH 01/10] dt-bindings: crypto: k3: Add sa2ul bindings documentation
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- RE: Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: Testmgr fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH 01/10] dt-bindings: crypto: k3: Add sa2ul bindings documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: CAVS test implementation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- CAVS test implementation
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: AEAD question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Testmgr fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: ghash - add comment and improve help text
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - add comment and improve help text
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ghash - add comment and improve help text
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: generic ahash question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: generic ahash question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] padata: purge get_cpu and reorder_via_wq from padata_do_serial
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - move shared symbols in a common location
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: generic ahash question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]