Linux Crypto
[Prev Page][Next Page]
- [PATCH 13/34] rapidio: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 02/34] net/rds: convert put_page() to put_user_page*()
- From: john.hubbard@xxxxxxxxx
- [PATCH 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
- From: john.hubbard@xxxxxxxxx
- [PATCH 00/34] put_user_pages(): miscellaneous call sites
- From: john.hubbard@xxxxxxxxx
- Re: [PATCH v4 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Need help with failling gcm_base(ctr,ghash-generic) selftest
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [RFC 2/9] dt-bindings: rng: amlogic,meson-rng: convert to yaml
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- [RFC 0/9] dt-bindings: first tentative of conversion to yaml format
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- [PATCH 3/5] crypto: Reduce default RT priority
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- Re: [f2fs-dev] [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] linux-next 20190731 - aegis128-core.c fails to build
- From: "Valdis Klētnieks" <valdis.kletnieks@xxxxxx>
- [PATCH] asm-generic: Remove redundant arch-specific rules for simd.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [f2fs-dev] [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto:ccp - Return from init on allocation failure
- From: Gary R Hook <ghook@xxxxxxx>
- Sent out some incorrect patch mails for crypto:inside-secure, please ignore
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCHv3 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/4] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/4] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/4] crypto: inside-secure - Remove redundant algo to engine mapping code
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/4] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv3 0/4] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v5 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s390/aes - fix name clash after AES library refactor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH for-4.14.y 3/3] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] crypto: inside-secure: Remove redundant DES ECB & CBC keysize check
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto:ccp - Clean up and exit correctly on allocation failure
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: Crypto API skcipher key size question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH for-4.14.y 3/3] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Amit Pundir <amit.pundir@xxxxxxxxxx>
- Re: [PATCH v5 13/29] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 13/29] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v8 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v9 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v9 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto:ccp - Return from init on allocation failure
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v6 05/57] crypto: Remove dev_err() usage after platform_get_irq()
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v8 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Crypto API skcipher key size question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v4] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - Ignore tag length when decrypting GCM ciphertext
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Add support for valid authsize values less than 16
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Fix oops by properly managing allocated structures
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 0/3] AES GCM fixes for the CCP crypto driver
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Use defines instead of some constants (cosmetic)
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure: This fixes a mistake in a comment for XTS
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - Cosmetic fixes for readability
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC 3/3] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 2/3] crypto/sha256: Export a sha256_{init,update,final}_direct() API
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 1/3] crypto/sha256: Factor out the parts of base API that don't use shash_desc
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [RFC 0/3] Making a secure hash function avaiable during early boot?
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v4 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v4 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v4 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3] crypto: gcm - restrict assoclen for rfc4543
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v4 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v4 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Backlog support for CAAM?
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: caam - fix concurrency issue in givencrypt descriptor
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 15/16] ubifs: wire up new fscrypt ioctls
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ux500/crypt: Mark expected switch fall-throughs
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH 4.14 147/293] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.14 126/293] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: ccp - Log an error message when ccp-crypto fails to load
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] crypto: ccree: use std api sg_zero_buffer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ccree: use the full crypt length value
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: ccree: aead fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] asm-generic: make simd.h a mandatory include/asm header
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: aegis128 - deal with missing simd.h header on some architecures
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto/aegis128-core.c:19:22: fatal error: asm/simd.h: No such file or directory
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 13/16] ext4: wire up new fscrypt ioctls
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] hwrng: timeriomem - add include guard to timeriomem-rng.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v7 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: Martin Blumenstingl <martin.blumenstingl@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: gcm.c question regarding the rfc4106 cipher suite
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: Remove redundant #ifdef in crypto_yield()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: gcm.c question regarding the rfc4106 cipher suite
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: s390/aes - fix name clash after AES library refactor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [cryptodev:master 18/80] arch/s390/crypto/aes_s390.c:111:13: error: conflicting types for 'aes_encrypt'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: inside-secure - Fix null ptr derefence on rmmod for macchiatobin
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - Move static cipher alg & mode settings to init
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/2] Add support for the AES-XTS algorithm
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- gcm.c question regarding the rfc4106 cipher suite
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v3 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 06/14] crypto: caam - check assoclen
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 05/14] crypto: caam - check authsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 04/14] crypto: caam - check key length
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH AUTOSEL 5.2 73/85] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCHv2 1/3] Kconfig: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 3/3] crypto: inside-secure - add support for using the EIP197 without vendor firmware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCHv2 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add tests for lzo-rle
- From: Dave Rodgman <dave.rodgman@xxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - add comment and improve help text
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: purge get_cpu and reorder_via_wq from padata_do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccree - check assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Reduce maximum stack usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Improve system log messaging in ccp-crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Add support for loading asymmetric crypto firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Add module parameters to control CCP activation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ux500: Use spinlock_t instead of struct spinlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - add more AEAD ciphersuites
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] crypto: CAESAR final portfolio follow-up
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add tests for lzo-rle
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/32] crypto: AES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: inside-secure - fix cryptomgr extratests issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: ccree: cleanups, fixes and TEE FIPS support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: ccree - fix spelling mistake "configration" -> "configuration"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ux500: Use spinlock_t instead of struct spinlock
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCHv2 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2 10/10] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [RFC 9/9] padata: remove cpu_index from the parallel_queue
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 1/9] padata: allocate workqueue internally
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 8/9] padata: unbind parallel jobs from specific CPUs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 4/9] padata: make padata_do_parallel find alternate callback CPU
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 6/9] padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 2/9] workqueue: unconfine alloc/apply/free_workqueue_attrs()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 0/9] padata: use unbound workqueues for parallel jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 7/9] padata: use separate workqueues for parallel and serial work
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 3/9] workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [RFC 5/9] pcrypt: remove padata cpumask notifier
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH 1/4] dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 3/4] MAINTAINERS: Add myself as maintainer of amlogic crypto
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 4/4] ARM64: dts: amlogic: adds crypto hardware node
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 2/4] crypto: amlogic: Add crypto accelerator for amlogic GXL
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 0/4] crypto: add amlogic crypto offloader driver
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- Re: [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 10/14] crypto: caam - fix MDHA key derivation for certain user key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: aes - helper function to validate key length for AES algorithms
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 0/2] crypto: validate inputs for gcm and aes
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: gcm - helper functions for assoclen/authsize check
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [RFC PATCH] rxrpc: Fix -Wframe-larger-than= warnings from on-stack crypto
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] hwrng: Use device-managed registration API
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH] hwrng: Use device-managed registration API
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Backlog support for CAAM?
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4.19 218/271] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 182/271] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Backlog support for CAAM?
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 5.2 346/413] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 250/371] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.1 315/371] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.2 274/413] crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: jitterentropy: build without sanitizer
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: crypto: keyinfo: Fix a possible null-pointer dereference in derive_key_aes()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - Improve randomization of params for AEAD fuzz testing
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH v2] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Nishka Dasgupta <nishkadg.linux@xxxxxxxxx>
- Re: [PATCH] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v2 1/3] mm: Introduce page_size()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 2/2] crypto: user - fix potential warnings in cryptouser.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: add header include guards
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH] crypto: nx: nx-842-powernv: Add of_node_put() before return
- From: Nishka Dasgupta <nishkadg.linux@xxxxxxxxx>
- [PATCH] crypto: qat - Silence smp_processor_id() warning
- From: "Sverdlin, Alexander (Nokia - DE/Ulm)" <alexander.sverdlin@xxxxxxxxx>
- [PATCH] crypto: atmel-sha204a: Use device-managed registration API
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RESEND PATCH 01/10] dt-bindings: crypto: k3: Add sa2ul bindings documentation
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- RE: Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: Testmgr fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH 01/10] dt-bindings: crypto: k3: Add sa2ul bindings documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: CAVS test implementation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- CAVS test implementation
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: AEAD question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Testmgr fuzz testing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v1 2/2] hwrng: npcm: add NPCM RNG driver
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 1/2] dt-binding: hwrng: add NPCM RNG documentation
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- [PATCH v1 0/2] hwrng: npcm: add NPCM RNG driver support
- From: Tomer Maimon <tmaimon77@xxxxxxxxx>
- RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Testmgr fuzz testing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: ghash - add comment and improve help text
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - add comment and improve help text
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ghash - add comment and improve help text
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: generic ahash question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: generic ahash question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] padata: purge get_cpu and reorder_via_wq from padata_do_serial
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - move shared symbols in a common location
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: generic ahash question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 12/14] crypto: caam - execute module exit point only if necessary
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 06/14] crypto: caam - check assoclen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/14] crypto: caam - check zero-length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 06/14] crypto: caam - check assoclen
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: generic ahash question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/14] crypto: caam - check authsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 04/14] crypto: caam - check key length
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v2 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: ccree - check assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: bcm - check assoclen for rfc4543/rfc4106
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] Docs: move more driver,device related docs into drivers dir follows kernel source
- From: Alex Shi <alex.shi@xxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 10/14] crypto: caam - fix DKP for certain key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - move shared symbols in a common location
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 10/14] crypto: caam - fix DKP for certain key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] crypto: aegis: fix badly optimized clang output
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC/RFT v2 2/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp/gcm - use const time tag comparison.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v6 01/14] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 13/14] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 14/14] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 10/14] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 09/14] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 00/14] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/2] char: hw_random: mxc-rnga: use devm_platform_ioremap_resource() to simplify code
- From: Aisheng Dong <aisheng.dong@xxxxxxx>
- RE: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Aisheng Dong <aisheng.dong@xxxxxxx>
- Re: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/2] char: hw_random: mxc-rnga: use devm_platform_ioremap_resource() to simplify code
- From: Anson.Huang@xxxxxxx
- [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Anson.Huang@xxxxxxx
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v5 02/14] crypto: caam - simplfy clock initialization
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/8] tpm: block messages while suspended
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] Documentation/arm: repointer docs to Documentation/arch/arm
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 13/14] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 00/14] pending doc patches for 5.3-rc
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7o file/swap crypto package
- From: Jari Ruusu <jari.ruusu@xxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- From: Joey Lee <JLee@xxxxxxxx>
- Re: [PATCH v5 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v5 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 09/14] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 00/14] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 14/14] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 13/14] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 10/14] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 01/14] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v4 02/16] crypto: caam - simplify clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 056/249] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 184/249] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 027/219] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 064/219] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 162/219] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 013/158] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 045/158] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 028/105] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 027/105] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 07/73] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 07/53] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 22/73] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 61/73] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 23/73] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 085/105] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 084/105] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 010/105] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 119/158] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 118/158] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 034/158] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 033/158] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 161/219] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 086/219] crypto: testmgr - add some more preemption points
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 021/219] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 049/219] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 048/219] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 183/249] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 098/249] crypto: testmgr - add some more preemption points
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 074/249] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 057/249] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 029/249] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 021/249] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 013/158] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 021/219] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 021/249] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 8/8] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 8/8] docs: remove extra conf.py files
- From: Markus Heiser <markus.heiser@xxxxxxxxxxx>
- [PATCH 0/8] docs: some improvements when producing PDF files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 8/8] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH net] ppp: mppe: Revert "ppp: mppe: Add softdep to arc4"
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH net] ppp: mppe: Revert "ppp: mppe: Add softdep to arc4"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: CAVS test harness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: Convert Allwinner A10 Security Engine to a schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx: fix a potential double free in ppc4xx_trng_probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]