Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 4/7] crypto: sha256 - Use get/put_unaligned_be32 to get input, memzero_explicit
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: sha256_generic - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: sha256 - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/6] crypto: sha256 - Use get_unaligned_be32 to get input, memzero_explicit
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: INFO: task hung in tls_sw_release_resources_tx
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: sha256 - Make lib/crypto/sha256.c suitable for generic use
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 6/6] crypto: sha256_generic - Use sha256_transform from generic sha256 lib
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 4/6] crypto: sha256 - Use get_unaligned_be32 to get input, memzero_explicit
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 2/6] crypto: sha256_generic - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/6] crypto: sha256 - Move lib/sha256.c to lib/crypto
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/6] crypto: sha256 - Fix some coding style issues
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 0/6] crypto: sha256 - Merge 2 separate C implementations into 1, put into separate library
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] crypto: vmx/xts - use fallback for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: s390/xts-aes - invoke fallback for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto: x86/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC/RFT PATCH] crypto: aes/xts - implement support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: XTS self test fail
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: XTS self test fail
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- XTS self test fail
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] Use ccm(aes) aead transform in staging drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/2] staging: rtl8192e: rtllib_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] staging: rtl8192u: ieee80211: ieee80211_crypt_ccmp.c: Use crypto API ccm(aes)
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/2] Use ccm(aes) aead transform in staging drivers
- From: Christina Quast <contact@xxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [v3 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [cryptodev:master 145/162] drivers/crypto/hisilicon/qm.c:350:26: warning: format '%p' expects argument of type 'void *', but argument 6 has type 'dma_addr_t {aka long long unsigned int}'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [v3 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto driver callback problem
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v12 4/4] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 2/4] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 3/4] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: aegis128 followup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: streebog - remove two unused variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: crypto_engine: Fix Sphinx warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: cavium/nitrox - Allocate asymmetric crypto command queues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - Use refcount_t for refcount
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi - execute library only on DPAA 1.x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: hisilicon - Fix warning on printing %p with dma_addr_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [PATCH v5 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 01/30] crypto: des/3des_ede - add new helpers to verify keys
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: chtls - use 'skb_put_zero()' instead of re-implementing it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/20] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v11 4/4] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 3/4] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 2/4] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v11 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 1/5] crypto: hisilicon - fix kbuild warnings
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 3/5] crypto: hisilicon - init curr_sgl_dma to fix compile warning
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 4/5] crypto: hisilicon - add missing single_release
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 2/5] crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: hisilicon - fix error handle in hisi_zip_create_req_q
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 0/5] crypto: hisilicon: Misc fixes
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [dm-devel] [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] MAINTAINERS: nx crypto: Fix typo in a filepath
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH v2 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v8 20/20] fscrypt: document the new ioctls and policy version
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 15/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 14/20] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 08/20] fscrypt: rename keyinfo.c to keysetup.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 07/20] fscrypt: move v1 policy key setup to keysetup_v1.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 06/20] fscrypt: refactor key setup code in preparation for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v8 05/20] fscrypt: rename fscrypt_master_key to fscrypt_direct_key
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH 3/2] padata: initialize usable masks to reflect offlined CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH v7 02/15] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 03/15] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 04/15] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 05/15] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 06/15] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 07/15] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 10/15] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 12/15] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 14/15] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 13/15] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 15/15] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 11/15] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 09/15] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 08/15] crypto: caam - share definition for MAX_SDLEN
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 01/15] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v2] lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v10 7/7] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 6/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 4/7] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 5/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v10 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:322:2: error: impossible constraint in 'asm'
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:338:2: note: in expansion of macro 'dev_dbg'
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] crypto: aegis128 followup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v9 7/7] md: dm-crypt: omit parsing of the encapsulated cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 6/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 4/7] crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 5/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 3/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v9 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 1/2] padata: always acquire cpu_hotplug_lock before pinst->lock
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 2/2] padata: validate cpumask without removed CPU during offline
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: XTS template wrapping question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: XTS template wrapping question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: streebog - remove two unused variables
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:322:2: error: impossible constraint in 'asm'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 124/144] drivers/crypto/hisilicon/qm.c:338:2: note: in expansion of macro 'dev_dbg'
- From: kbuild test robot <lkp@xxxxxxxxx>
- XTS template wrapping question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 20/41] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- RE: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH -next] crypto: streebog - remove two unused variables
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- [PATCH -next] crypto: aes-generic - remove unused variable 'rco_tab'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - add support for ciphertext stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xts - add support for ciphertext stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 00/12] crypto: use devm_platform_ioremap_resource() to simplify code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: ccp - Remove unnecessary includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] crypto: Reduce default RT priority
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/14] crypto: caam - fixes for kernel v5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto:ccp - Clean up and exit correctly on allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/57] crypto: Remove dev_err() usage after platform_get_irq()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Log an error message when ccp-crypto fails to load
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: ccree: aead fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AEAD question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] Documentation: crypto: crypto_engine: Fix Sphinx warning
- From: Jonathan Neuschäfer <j.neuschaefer@xxxxxxx>
- RE: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: "Weiny, Ira" <ira.weiny@xxxxxxxxx>
- [PATCH] padata: initialize pd->cpu with effective cpumask
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 2/2] crypto: cavium/nitrox - Configure asymmetric queue manager Hardware unit
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- [PATCH 1/2] crypto: cavium/nitrox - Allocate asymmetric crypto command queues
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v8 06/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 09/28] x86/asm: annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v8 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [PATCH 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: cryptd - Use refcount_t for refcount
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCHv2] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: chtls - use 'skb_put_zero()' instead of re-implementing it
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 10/41] media/ivtv: convert put_page() to put_user_page*()
- From: Hans Verkuil <hverkuil-cisco@xxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: Hans Verkuil <hverkuil-cisco@xxxxxxxxx>
- RE: [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: Sakari Ailus <sakari.ailus@xxxxxxxxxxxxxxx>
- [RFC PATCH v2] md/dm-crypt - reuse eboiv skcipher for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- [PATCH v3 02/41] drivers/gpu/drm/via: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 04/41] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 05/41] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 07/41] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 08/41] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 10/41] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 09/41] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 06/41] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 01/41] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 00/39] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 11/41] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 12/41] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 14/41] vmci: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 15/41] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 16/41] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 18/41] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 19/41] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 21/41] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 23/41] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 26/41] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 27/41] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 30/41] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 31/41] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 34/41] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 35/41] kernel/events/core.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 36/41] fs/binfmt_elf: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 39/41] mm/mlock.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 40/41] mm/mempolicy.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 41/41] mm/ksm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 38/41] powerpc: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 37/41] security/tomoyo: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 32/41] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 33/41] fs/nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 29/41] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 28/41] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 22/41] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 20/41] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 17/41] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 25/41] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 24/41] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 13/41] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v3 03/41] net/xdp: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- Re: [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH v8 12/20] fscrypt: add an HKDF-SHA512 implementation
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- RE: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFCv2 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccp - Remove unnecessary linux/pci.h include
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp - Include DMA declarations explicitly
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC/RFT v3 3/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 0/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [GIT PULL] inside-secure: add new GPLv2 "mini" firmware for the EIP197 driver
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv4 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCHv4 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv4 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [RFC PATCH 2/2] md/dm-crypt - switch to AES library for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/2] md/dm-crypt - restrict EBOIV to cbc(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/2] dm-crypt: get rid of cipher API for EBOIV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xts - Add support for Cipher Text Stealing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCH v4 02/30] crypto: s390/des - switch to new verification routines
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v3] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 23/30] crypto: talitos/des - switch to new verification routines
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 01/30] crypto: des/3des_ede - add new helpers to verify keys
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/34] drm/i915: convert put_page() to put_user_page*()
- From: Rodrigo Vivi <rodrigo.vivi@xxxxxxxxx>
- Re: [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v8 01/20] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 05/20] fscrypt: rename fscrypt_master_key to fscrypt_direct_key
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 06/20] fscrypt: refactor key setup code in preparation for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 04/20] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 02/20] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 08/20] fscrypt: rename keyinfo.c to keysetup.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 11/20] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 09/20] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 07/20] fscrypt: move v1 policy key setup to keysetup_v1.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 16/20] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 17/20] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 14/20] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 18/20] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 13/20] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 15/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 10/20] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 20/20] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 19/20] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 12/20] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 03/20] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 00/20] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- [PATCH] dt-bindings: rng: mtk-rng: Add documentation for MT8516
- From: Fabien Parent <fparent@xxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam/qi - execute library only on DPAA 1.x
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: caam/qi - execute library only on DPAA 1.x
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [RFCv2 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [RFCv2 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH -next 03/12] crypto: exynos - use devm_platform_ioremap_resource() to simplify code
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCHv3 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv3 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v2 31/34] fs/nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- [PATCH v2 00/34] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 04/34] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 03/34] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 06/34] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 05/34] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 09/34] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 07/34] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 08/34] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 10/34] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 11/34] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 12/34] vmci: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 13/34] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 14/34] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 17/34] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 19/34] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 18/34] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 20/34] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 21/34] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 22/34] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 23/34] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 25/34] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 24/34] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 27/34] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 29/34] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 28/34] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 30/34] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 32/34] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 31/34] fs/nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 34/34] fs/binfmt_elf: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH v2 33/34] kernel/events/core.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [f2fs-dev] [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Chao Yu <chao@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH -next 07/12] crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/34] genwqe: convert put_page() to put_user_page*()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: Calum Mackay <calum.mackay@xxxxxxxxxx>
- [PATCH 1/2] crypto: ccp - Include DMA declarations explicitly
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH 2/2] crypto: ccp - Remove unnecessary linux/pci.h include
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH 0/2] crypto: ccp - Remove unnecessary includes
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH 03/34] net/ceph: convert put_page() to put_user_page*()
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next 05/12] crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH -next 09/12] crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- RE: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: "Weiny, Ira" <ira.weiny@xxxxxxxxx>
- [PATCH RFC 3/3] crypto: arm64/aegis128 - implement plain NEON version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 2/3] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 1/3] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/3] crypto: aegis128 followup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: Keith Busch <keith.busch@xxxxxxxxx>
- [PATCH -next 06/12] crypto: mediatek - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 05/12] crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 03/12] crypto: exynos - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 02/12] crypto: ccp - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 01/12] crypto: artpec6 - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 04/12] crypto: img-hash - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 07/12] crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 09/12] crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 12/12] crypto: qcom-rng - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 11/12] crypto: qce - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 10/12] crypto: stm32 - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 08/12] crypto: sunxi-ss - use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next 00/12] crypto: use devm_platform_ioremap_resource() to simplify code
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Jan Kara <jack@xxxxxxx>
- [PATCH 4.9 082/223] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 098/223] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 068/158] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: Joonas Lahtinen <joonas.lahtinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- RE: [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v5] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 3/7] crypto: hisilicon - add HiSilicon ZIP accelerator support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: hisilicon - add debugfs for ZIP and QM
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 1/7] crypto: hisilicon - add queue management driver for HiSilicon QM module
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 2/7] crypto: hisilicon - add hardware SGL support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 4/7] crypto: hisilicon - add SRIOV support for ZIP
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 7/7] MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 5/7] Documentation: Add debugfs doc for hisi_zip
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v3 0/7] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 0/3] AES GCM fixes for the CCP crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - defer probing until QMan is available
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: timeriomem - add include guard to timeriomem-rng.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy: build without sanitizer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Remove redundant #ifdef in crypto_yield()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: add header include guards
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v4] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- [PATCH 31/34] nfs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 14/34] oradax: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 32/34] goldfish_pipe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 16/34] drivers/tee: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 30/34] crypt: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 17/34] vfio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 25/34] mm/frame_vector.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 19/34] fsl_hypervisor: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 22/34] orangefs: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 23/34] uprobes: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 18/34] fbdev/pvr2fb: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 20/34] xen: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 15/34] staging/vc04_services: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 21/34] fs/exec.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 24/34] futex: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 04/34] x86/kvm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 26/34] mm/gup_benchmark.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 08/34] media/ivtv: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 09/34] media/v4l2-core/mm: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 07/34] drm/radeon: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 27/34] mm/memory.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 10/34] genwqe: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 05/34] drm/etnaviv: convert release_pages() to put_user_pages()
- From: john.hubbard@xxxxxxxxx
- [PATCH 28/34] mm/madvise.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 11/34] scif: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 03/34] net/ceph: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 29/34] mm/process_vm_access.c: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]