Linux Crypto
[Prev Page][Next Page]
- Re: ghash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 12/14] crypto: caam - execute module exit point only if necessary
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 06/14] crypto: caam - check assoclen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/14] crypto: caam - check zero-length input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 06/14] crypto: caam - check assoclen
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: generic ahash question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/14] crypto: caam - check authsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- generic ahash question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH v2 04/14] crypto: caam - check key length
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- ghash
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v2 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: ccree - check assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: bcm - check assoclen for rfc4543/rfc4106
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT] Crypto Fixes for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] Docs: move more driver,device related docs into drivers dir follows kernel source
- From: Alex Shi <alex.shi@xxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 10/14] crypto: caam - fix DKP for certain key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aegis: fix badly optimized clang output
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - move shared symbols in a common location
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/14] crypto: caam/qi - fix error handling in ERN handler
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 05/14] crypto: caam - check authsize
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 02/14] crypto: caam - fix return code in completion callbacks
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 07/14] crypto: caam - check zero-length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 06/14] crypto: caam - check assoclen
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 11/14] crypto: caam - free resources in case caam_rng registration failed
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 08/14] crypto: caam - update rfc4106 sh desc to support zero length input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 09/14] crypto: caam - keep both virtual and dma key addresses
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 14/14] crypto: caam - change return value in case CAAM has no MDHA
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 12/14] crypto: caam - execute module exit point only if necessary
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 10/14] crypto: caam - fix DKP for certain key lengths
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 13/14] crypto: caam - unregister algorithm only if the registration succeeded
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 04/14] crypto: caam - check key length
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 03/14] crypto: caam - update IV only when crypto operation succeeds
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 00/14] crypto: caam - fixes for kernel v5.3
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: gcm - restrict assoclen for rfc4543
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] crypto: aegis: fix badly optimized clang output
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
- From: Chuhong Yuan <hslester96@xxxxxxxxx>
- [PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC/RFT v2 2/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- RE: xts fuzz testing and lack of ciphertext stealing support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp/gcm - use const time tag comparison.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v6 01/14] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 13/14] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 14/14] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 10/14] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 09/14] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v6 00/14] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH] padata: Replace delayed timer with immediate workqueue in padata_reorder
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/2] char: hw_random: mxc-rnga: use devm_platform_ioremap_resource() to simplify code
- From: Aisheng Dong <aisheng.dong@xxxxxxx>
- RE: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Aisheng Dong <aisheng.dong@xxxxxxx>
- Re: [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/2] char: hw_random: mxc-rnga: use devm_platform_ioremap_resource() to simplify code
- From: Anson.Huang@xxxxxxx
- [PATCH 1/2] char: hw_random: imx-rngc: use devm_platform_ioremap_resource() to simplify code
- From: Anson.Huang@xxxxxxx
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v5 02/14] crypto: caam - simplfy clock initialization
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: xts fuzz testing and lack of ciphertext stealing support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/8] tpm: block messages while suspended
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- xts fuzz testing and lack of ciphertext stealing support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] Documentation/arm: repointer docs to Documentation/arch/arm
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [v2 PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] padata: Use RCU when fetching pd from do_serial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 13/14] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 00/14] pending doc patches for 5.3-rc
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7o file/swap crypto package
- From: Jari Ruusu <jari.ruusu@xxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- From: Joey Lee <JLee@xxxxxxxx>
- Re: [PATCH v5 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v5 04/14] crypto: caam - request JR IRQ as the last step
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 05/14] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 07/14] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 11/14] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 09/14] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 06/14] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 03/14] crypto: caam - convert caam_jr_init() to use devres
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 02/14] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 00/14] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 14/14] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 13/14] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 10/14] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 08/14] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 01/14] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v4 02/16] crypto: caam - simplify clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 056/249] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 184/249] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 027/219] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 064/219] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 162/219] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 013/158] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 045/158] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 028/105] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 027/105] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 07/73] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 07/53] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 22/73] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 61/73] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 23/73] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 085/105] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 084/105] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 010/105] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 119/158] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 118/158] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 034/158] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 033/158] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 161/219] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 086/219] crypto: testmgr - add some more preemption points
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 021/219] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 049/219] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 048/219] crypto: talitos - properly handle split ICV.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 183/249] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 098/249] crypto: testmgr - add some more preemption points
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 074/249] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 057/249] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 029/249] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 021/249] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 013/158] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.1 021/219] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 021/249] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 8/8] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH 8/8] docs: remove extra conf.py files
- From: Markus Heiser <markus.heiser@xxxxxxxxxxx>
- [PATCH 0/8] docs: some improvements when producing PDF files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 8/8] docs: remove extra conf.py files
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH net] ppp: mppe: Revert "ppp: mppe: Add softdep to arc4"
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH net] ppp: mppe: Revert "ppp: mppe: Add softdep to arc4"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [patch v2] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: CAVS test harness
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: Convert Allwinner A10 Security Engine to a schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx: fix a potential double free in ppc4xx_trng_probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Reduce maximum stack usage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [RFC PATCH] Docs: move more driver,device related docs into drivers dir follows kernel source
- From: Alex Shi <alex.shi@xxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/12] Documentation/arm: repointer docs to Documentation/arch/arm
- From: Alex Shi <alex.shi@xxxxxxxxxxxxxxxxx>
- [PATCH] padata: use smp_mb in padata_reorder to avoid orphaned padata jobs
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- [PATCH] dt-bindings: crypto: Convert Allwinner A10 Security Engine to a schema
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: CAVS test harness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [patch] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- [PATCH 2/2] crypto: ccp - Log an error message when ccp-crypto fails to load
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/2] crypto: ccp - Include the module name in system log messages
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 0/2] Improve system log messaging in ccp-crypto
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [patch] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- Re: CAVS test harness
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [LTP] [PATCH] crypto/crypto_user02.c: new test that tries to delete larval algorithm
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: Coccinelle: Checking the deletion of duplicate of_node_put() calls with SmPL
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- crypto: Remove orphan tools/crypto directory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: ccp - memset structure fields to zero before reuse
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto/crypto_user02.c: new test that tries to delete larval algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 01/22] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Add support for loading asymmetric crypto firmware
- From: Phani Kiran Hemadri <phemadri@xxxxxxxxxxx>
- [PATCH v2 4/4] crypto: ccp - Add a module parameter to control registration for DMA
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 3/4] crypto: ccp - module parameter to limit the number of enabled CCPs
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 2/4] crypto: ccp - Add a module parameter to specify a queue count
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 1/4] crypto: ccp - Make CCP debugfs support optional
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 0/4] Add module parameters to control CCP activation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Coccinelle: Checking the deletion of duplicate of_node_put() calls with SmPL
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: CAVS test harness
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: user - make NETLINK_CRYPTO work inside netns
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- CAVS test harness
- From: "Bhat, Jayalakshmi Manjunath" <jayalakshmi.bhat@xxxxxx>
- Re: [GIT] Crypto Update for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v8 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v8 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Gary R Hook <ghook@xxxxxxx>
- [GIT] Crypto Update for 5.3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx: fix a potential double free in ppc4xx_trng_probe
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] crypto: crypto4xx: fix a potential double free in ppc4xx_trng_probe
- From: Wen Yang <wen.yang99@xxxxxxxxxx>
- RE: testmgr fuzzing for AEAD ciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: testmgr fuzzing for AEAD ciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - remove unused struct entry
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- FW: skcipher and aead API question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 2/9] crypto: inside-secure - silently return -EINVAL for input error cases
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- FW: skcipher and aead API question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- FW: skcipher and aead API question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - remove unused struct entry
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH 2/9] crypto: inside-secure - silently return -EINVAL for input error cases
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: inside-secure - keep ivsize for DES ECB modes at 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - remove unused struct entry
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/9] crypto: inside-secure - silently return -EINVAL for input error cases
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: [PATCH] crypto: inside-secure - remove unused struct entry
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - remove unused struct entry
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: skcipher and aead API question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] crypto: caam - move tasklet_init() call down
- From: Horia Geanta <horia.geanta@xxxxxxx>
- skcipher and aead API question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - remove unused struct entry
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure -reduce hash byte counters to 64 bits
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - added support for rfc3686(ctr(aes))
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - add support for authenc(hmac(sha*),rfc3686(ctr(aes))) suites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - add more AEAD ciphersuites
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v8 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 7/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 5/7] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 6/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 3/7] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v4 02/16] crypto: caam - simplify clock initialization
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/7] crypto: ux500: Use spinlock_t instead of struct spinlock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] dm-crypt: Implement eboiv - encrypted byte-offset initialization vector.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: [PATCH v4 05/16] crypto: caam - use devres to allocate 'outring'
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: testmgr fuzzing for AEAD ciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- testmgr fuzzing for AEAD ciphers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/16] crypto: caam - move tasklet_init() call down
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - prevent operating on larval algorithms
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] crypto: user - prevent operating on larval algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: user - prevent operating on larval algorithms
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH] crypto: ccp - memset structure fields to zero before reuse
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v7 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/generic - use unaligned loads to eliminate 50% of lookup tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 03/16] crypto: caam - move tasklet_init() call down
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
- From: Fuqian Huang <huangfq.daxian@xxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [net/tls] Re: KMSAN: uninit-value in aesti_encrypt
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH] crypto: user - prevent operating on larval algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - Fix skcipher instance memory leak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: stm32/hash: Fix bug in hmac mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: stm32/crc32 - rename driver file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/27] crypto: remove memset after dma_alloc_coherent
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Switch to SPDX license identifiers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp - Validate the the error value used to index error messages
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Clean up crypto documentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/aes-ce - implement 5-way interleave for some modes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] *** SUBJECT HERE ***
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: stm32/hash - Fix incorrect printk modifier for size_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/16] crypto: caam - simplify clock initialization
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- Re: [PATCH v4 03/16] crypto: caam - move tasklet_init() call down
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- [PATCH] Crypto: aegis128l: fix a coding stlye issue
- From: Fatih ALTINPINAR <fatihaltinpinar@xxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: aes/generic - use unaligned loads to eliminate 50% of lookup tables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/30] crypto: Use kmemdup rather than duplicating its implementation
- From: Fuqian Huang <huangfq.daxian@xxxxxxxxx>
- [PATCH v4 1/7] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 2/7] crypto: aegis128l/aegis256 - remove x86 and generic implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 7/7] crypto: tcrypt - add a speed test for AEGIS128
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 6/7] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 5/7] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/7] crypto: aegis - avoid prerotated AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 3/7] crypto: aegis128 - drop empty TFM init/exit routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 0/7] crypto: CAESAR final portfolio follow-up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 02/16] crypto: caam - simplify clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 03/16] crypto: caam - move tasklet_init() call down
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 01/16] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 04/16] crypto: caam - use deveres to allocate 'entinfo'
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 06/16] crypto: caam - use devres to allocate 'inpring'
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 05/16] crypto: caam - use devres to allocate 'outring'
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 09/16] crypto: caam - drop 64-bit only wr/rd_reg64()
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 10/16] crypto: caam - make CAAM_PTR_SZ dynamic
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 11/16] crypto: caam - move cpu_to_caam_dma() selection to runtime
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 12/16] crypto: caam - drop explicit usage of struct jr_outentry
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 14/16] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 13/16] crypto: caam - don't hardcode inpentry size
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 15/16] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 16/16] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 08/16] crypto: caam - use ioread64*_hi_lo in rd_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 07/16] crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 00/16] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v3 1/5] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v7 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - add tests for lzo-rle
- From: Hannah Pan <hannahpan@xxxxxxxxxx>
- [PATCH] crypto: user - prevent operating on larval algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH 0/9] crypto: inside-secure - fix cryptomgr extratests issues
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- [PATCH v4 32/32] crypto: arm/aes-scalar - unexport en/decryption routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 31/32] crypto: arm64/aes-cipher - switch to shared AES inverse Sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 30/32] crypto: arm/aes-cipher - switch to shared AES inverse Sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 29/32] crypto: arm64/aes-neon - switch to shared AES Sboxes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 27/32] crypto: aes/generic - unexport last-round AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 28/32] crypto: lib/aes - export sbox and inverse sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 26/32] crypto: chelsio/aes - replace AES cipher calls with library calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 25/32] crypto: ccp - move to AES library for CMAC key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 24/32] crypto: amcc/aes - switch to AES library for GCM key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 23/32] bluetooth: switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 22/32] crypto: arm/ghash - provide a synchronous version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 21/32] crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 20/32] crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 19/32] crypto: aes/arm - use native endiannes for key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 17/32] crypto: aes - move sync ctr(aes) to AES library and generic helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 18/32] crypto: arm64/aes-ce-cipher - use AES library as fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 16/32] crypto: ctr - add helper for performing a CTR encryption walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 15/32] crypto: generic/aes - drop key expansion routine in favor of library version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 14/32] crypto: arm64/aes-ce - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 13/32] crypto: arm64/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 12/32] crypto: arm64/aes-ccm - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 11/32] crypto: arm/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 10/32] crypto: arm64/ghash - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 09/32] crypto: safexcel/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 08/32] crypto: cesa/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 06/32] crypto: x86/aes - drop scalar assembler implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 07/32] crypto: padlock/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 04/32] crypto: aes - create AES library based on the fixed time AES code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 05/32] crypto: x86/aes-ni - switch to generic for fallback and key routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 03/32] crypto: aes/fixed-time - align key schedule with other implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 02/32] crypto: aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 01/32] crypto: arm/aes-ce - cosmetic/whitespace cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 00/32] crypto: AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp/gcm - use const time tag comparison.
- From: Gary R Hook <ghook@xxxxxxx>
- Re: gcm-aes-ccp self-tests failure
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v2] crypto: ccp/gcm - use const time tag comparison.
- From: Cfir Cohen <cfir@xxxxxxxxxx>
- [PATCH v7 7/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 5/7] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 6/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 3/7] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v7 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- gcm-aes-ccp self-tests failure
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp/gcm - use const time tag comparison.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/9] crypto: inside-secure - add support for arbitrary size hash/HMAC updates
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 9/9] crypto: inside-secure - add support for 0 length HMAC messages
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 7/9] crypto: inside-secure - let HW deal with initial hash digest
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 6/9] crypto: inside-secure: back out parts of earlier HMAC update workaround
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 5/9] crypto: inside-secure - fix EINVAL error (buf overflow) for AEAD decrypt
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 4/9] crypto: inside-secure - fix scatter/gather list to descriptor conversion
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/9] crypto: inside-secure - silently return -EINVAL for input error cases
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 3/9] crypto: inside-secure - fix incorrect skcipher output IV
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - fix scatter/gather list to descriptor conversion
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/9] crypto: inside-secure - keep ivsize for DES ECB modes at 0
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH] crypto: inside-secure - fix scatter/gather list handling issues
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/9] crypto: inside-secure - fix cryptomgr extratests issues
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH] crypto: ccp/gcm - use const time tag comparison.
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH 4/4] crypto: ccree: notify TEE on FIPS tests errors
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: fips: add FIPS test failure notification chain
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: drop legacy ivgen support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: ccree: account for TEE not ready to report
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: ccree: cleanups, fixes and TEE FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 22/30] crypto: sun4i/des - switch to new verification routines
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v5 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v6 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: cryptd - Fix skcipher instance memory leak
- From: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx>
- Re: [PATCH] crypto: ccp/gcm - use const time tag comparison.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ccp/gcm - use const time tag comparison.
- From: Cfir Cohen <cfir@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH][next] crypto: ccree - fix spelling mistake "configration" -> "configuration"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: CAESAR final portfolio follow-up
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v6 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v6 3/7] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/7] crypto: aegis128l/aegis256 - remove x86 and generic implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 6/7] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 7/7] crypto: tcrypt - add a speed test for AEGIS128
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/7] crypto: aegis - avoid prerotated AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 3/7] crypto: aegis128 - drop empty TFM init/exit routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: CAESAR final portfolio follow-up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] crypto: aegis128l/aegis256 - remove x86 and generic implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] [v2] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: "Saidi, Ali" <alisaidi@xxxxxxxxxx>
- Re: [PATCH v6 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/7] crypto: aegis128l/aegis256 - remove x86 and generic implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: aegis128l/aegis256 - remove x86 and generic implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: tcrypt - add a speed test for AEGIS128
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: aegis - avoid prerotated AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: aegis128 - drop empty TFM init/exit routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: CAESAR final portfolio follow-up
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] [v2] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 5/7] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 7/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 6/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 3/7] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
- Re: [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Alexandre Belloni <alexandre.belloni@xxxxxxxxxxx>
- [PATCH 28/39] docs: admin-guide: add a series of orphaned documents
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v3 06/30] crypto: caam/des - switch to new verification routines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: stm32/hash: Fix hmac issue more than 256 bytes
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/2] crypto: stm32/hash: remove interruptible condition for dma
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/2] crypto: stm32/hash: Fix bug in hmac mode
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/1] crypto: stm32/crc32 - rename driver file
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH v3 28/32] crypto: lib/aes - export sbox and inverse sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 01/30] crypto: des/3des_ede - add new helpers to verify key length
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RESEND PATCH 07/10] crypto: sa2ul: Add hmac(sha1) HMAC algorithm support
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [RESEND PATCH 00/10] crypto: k3: Add sa2ul driver
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [RESEND PATCH 05/10] crypto: sha256_generic: Export the Transform function
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [RESEND PATCH 00/10] crypto: k3: Add sa2ul driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND PATCH 02/10] crypto: sa2ul: Add crypto driver
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [RESEND PATCH 00/10] crypto: k3: Add sa2ul driver
- From: keerthy <j-keerthy@xxxxxx>
- Re: [RESEND PATCH 07/10] crypto: sa2ul: Add hmac(sha1) HMAC algorithm support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND PATCH 06/10] crypto: sa2ul: Add hmac(sha256)cbc(aes) AEAD Algo support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND PATCH 05/10] crypto: sha256_generic: Export the Transform function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND PATCH 02/10] crypto: sa2ul: Add crypto driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND PATCH 00/10] crypto: k3: Add sa2ul driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RESEND PATCH 06/10] crypto: sa2ul: Add hmac(sha256)cbc(aes) AEAD Algo support
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 05/10] crypto: sha256_generic: Export the Transform function
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 04/10] crypto: sa2ul: Add aead support for hmac(sha1)cbc(aes) algorithm
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 02/10] crypto: sa2ul: Add crypto driver
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 03/10] crypto: sa2ul: Add AES ECB Mode support
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 07/10] crypto: sa2ul: Add hmac(sha1) HMAC algorithm support
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 10/10] arm64: dts: k3-am6: Add crypto accelarator node
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 09/10] sa2ul: Add 3DES ECB & CBC Mode support
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 08/10] crypto: sa2ul: Add hmac(sha256) HMAC algorithm support
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 01/10] dt-bindings: crypto: k3: Add sa2ul bindings documentation
- From: Keerthy <j-keerthy@xxxxxx>
- [RESEND PATCH 00/10] crypto: k3: Add sa2ul driver
- From: Keerthy <j-keerthy@xxxxxx>
- Re: [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: testmgr - dynamically allocate testvec_config
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss - reduce stack usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: ccree: minor fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/27] crypto: remove memset after dma_alloc_coherent
- From: Fuqian Huang <huangfq.daxian@xxxxxxxxx>
- [PATCH v12 06/11] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 10/11] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 05/11] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 03/11] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 07/11] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 09/11] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 11/11] ima: Allow template= option for appraise rules as well
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 08/11] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 04/11] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 02/11] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [net/tls] Re: KMSAN: uninit-value in aesti_encrypt
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [net/tls] Re: KMSAN: uninit-value in aesti_encrypt
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH v3 28/32] crypto: lib/aes - export sbox and inverse sbox
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fscrypt: remove selection of CONFIG_CRYPTO_SHA256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/87] crypto: amcc: Remove call to memset after dma_alloc_coherent
- From: Fuqian Huang <huangfq.daxian@xxxxxxxxx>
- Re: [PATCH] fscrypt: remove selection of CONFIG_CRYPTO_SHA256
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: KMSAN: uninit-value in aesti_encrypt
- From: syzbot <syzbot+6f50c99e8f6194bf363f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [net/tls] Re: KMSAN: uninit-value in aesti_encrypt
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 7/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- KMSAN: uninit-value in aesti_encrypt
- From: syzbot <syzbot+6f50c99e8f6194bf363f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 5/7] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ccp - Switch to SPDX license identifiers
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH v2 11/30] crypto: hifn/des - switch to new verification routines
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: ccp - Validate the the error value used to index error messages
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH v2 22/30] crypto: sun4i/des - switch to new verification routines
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/30] crypto: DES/3DES cleanup
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 00/30] crypto: DES/3DES cleanup
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 06/30] crypto: caam/des - switch to new verification routines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/30] crypto: des/3des_ede - add new helpers to verify key length
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/5] crypto: caam - move DMA mask selection into a function
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3 32/32] crypto: arm/aes-scalar - unexport en/decryption routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 31/32] crypto: arm64/aes-cipher - switch to shared AES inverse Sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 30/32] crypto: arm/aes-cipher - switch to shared AES inverse Sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 29/32] crypto: arm64/aes-neon - switch to shared AES Sboxes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 28/32] crypto: lib/aes - export sbox and inverse sbox
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 27/32] crypto: aes/generic - unexport last-round AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 24/32] crypto: amcc/aes - switch to AES library for GCM key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 26/32] crypto: chelsio/aes - replace AES cipher calls with library calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 23/32] bluetooth: switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 25/32] crypto: ccp - move to AES library for CMAC key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 22/32] crypto: arm/ghash - provide a synchronous version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 20/32] crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 21/32] crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 19/32] crypto: aes/arm - use native endiannes for key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 18/32] crypto: arm64/aes-ce-cipher - use AES library as fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 17/32] crypto: aes - move sync ctr(aes) to AES library and generic helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 16/32] crypto: ctr - add helper for performing a CTR encryption walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 15/32] crypto: generic/aes - drop key expansion routine in favor of library version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 14/32] crypto: arm64/aes-ce - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 13/32] crypto: arm64/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 12/32] crypto: arm64/aes-ccm - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 11/32] crypto: arm/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 10/32] crypto: arm64/ghash - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 09/32] crypto: safexcel/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]