Linux Crypto
[Prev Page][Next Page]
- [PATCH v3 02/32] crypto: aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 01/32] crypto: arm/aes-ce - cosmetic/whitespace cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 00/32] crypto: AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 00/26]crypto: AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 06/30] crypto: caam/des - switch to new verification routines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam - fix dependency on CRYPTO_DES
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 05/30] crypto: bcm/des - switch to new verification routines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam - fix dependency on CRYPTO_DES
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: caam - fix dependency on CRYPTO_DES
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Samuel Neves <samuel.c.p.neves@xxxxxxxxx>
- [PATCH v5 7/7] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 6/7] crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 5/7] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 4/7] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/7] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 3/7] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 2/7] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 0/7] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: doc - Fix formatting of new crypto engine content
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: ccp - Validate the the error value used to index error messages
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] [PATCH v4 0/6] crypto: switch to crypto API for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/26]crypto: AES cleanup
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/30] crypto: DES/3DES cleanup
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: doc - Fix formatting of new crypto engine content
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] crypto: ccp - Validate the the error value used to index error messages
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 2/2] crypto: doc - Fix formatting of new crypto engine content
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 1/2] crypto: doc - Add parameter documentation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH v2 0/2] Clean up crypto documentation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: morus - remove generic and x86 implementations
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: aegis128 - add NEON intrinsics version for ARM/arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: morus - remove generic and x86 implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6] crypto: aegis128 - add NEON intrinsics version for ARM/arm64
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 03/11] crypto: ccp - Expose the value of nqueues in DebugFS
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 2/3] crypto: doc - Describe the crypto engine
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH] crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns
- From: Michal Suchanek <msuchanek@xxxxxxx>
- RE: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] airo: switch to skcipher interface
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/11] crypto: ccp - Add a module parameter to control registration for DMA
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH 08/11] crypto: ccp - module parameter to allow CCP selection by PCI bus
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH 06/11] crypto: ccp - Specify a single CCP via PCI device ID
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 04/11] crypto: ccp - module parameter to limit the number of enabled CCPs
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH 2/3] crypto: doc - Describe the crypto engine
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 03/11] crypto: ccp - Expose the value of nqueues in DebugFS
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: [PATCH 02/11] crypto: ccp - Add a module parameter to specify a queue count
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- Re: lib/mpi: Fix karactx leak in mpi_powm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v11 01/13] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH 09/11] crypto: ccp - expose pcibus module parameter in debugfs
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH 0/3] Clean up crypto documentation
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 11/11] crypto: ccp - Expose the registerdma module parameter in DFS
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 10/11] crypto: ccp - Add a module parameter to control registration for DMA
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 08/11] crypto: ccp - module parameter to allow CCP selection by PCI bus
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 07/11] crypto: ccp - expose the pcidev module parameter in debugfs
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 06/11] crypto: ccp - Specify a single CCP via PCI device ID
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 05/11] crypto: ccp - Expose maxdev through DebugFS
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 04/11] crypto: ccp - module parameter to limit the number of enabled CCPs
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 03/11] crypto: ccp - Expose the value of nqueues in DebugFS
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 02/11] crypto: ccp - Add a module parameter to specify a queue count
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 01/11] crypto: ccp - Make CCP debugfs support optional
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 00/11] Add module parameters to control CCP activation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 3/3] crypto: doc - Fix formatting of new crypto engine content
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/3] crypto: doc - Describe the crypto engine
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/3] crypto: doc - Add parameter documentation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 0/3] Clean up crypto documentation
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/2] crypto: arm64/aes-ce - implement 5 way interleave for ECB, CBC and CTR
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: arm64/aes-ce - add 5 way interleave routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto: arm64/aes-ce - implement 5-way interleave for some modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 1/4] lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
- From: Imre Deak <imre.deak@xxxxxxxxx>
- Re: [PATCH 0/6] crypto: aegis128 - add NEON intrinsics version for ARM/arm64
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [patch] crypto: ccp - Free ccp if initialization fails
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: qat - Endian bug in interrupt handler
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 5/6] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/8] tpm: block messages while suspended
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Endian bug in interrupt handler
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [RFC/RFT PATCH] crypto: aes/generic - use unaligned loads to eliminate 50% of lookup tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [patch] crypto: ccp - Free ccp if initialization fails
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- lib/mpi: Fix karactx leak in mpi_powm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/30] crypto: s390/des - switch to new verification routines
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: aegis - avoid prerotated AES tables
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 2/6] crypto: aegis - drop empty TFM init/exit routines
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/6] crypto: aegis128 - use unaliged helper in unaligned decrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/6] crypto: aegis128 - use unaliged helper in unaligned decrypt path
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v4 4/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Surachai Saiwong <buriram1601@xxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt - add a speed test for AEGIS128
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/6] crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/6] crypto: aegis128 - add support for SIMD acceleration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/6] crypto: aegis - avoid prerotated AES tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/6] crypto: aegis - drop empty TFM init/exit routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/6] crypto: aegis128 - use unaliged helper in unaligned decrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/6] crypto: aegis128 - add NEON intrinsics version for ARM/arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- memory leak in mpihelp_mul_karatsuba_case
- From: syzbot <syzbot+f7baccc38dcc1e094e77@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v4 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v4 2/3] dt-bindings: rng: add bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v4 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v5 3/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v5 1/4] lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v5 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v5 2/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v5 0/4] *** SUBJECT HERE ***
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v4 4/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v4 0/6] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] Crypto: fixed a comment coding style issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium remove casting dma_alloc
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: cavium remove casting dma_alloc
- From: Vasyl Gomonovych <gomonovych@xxxxxxxxx>
- [PATCH] crypto: cavium remove casting dma_alloc
- From: Vasyl Gomonovych <gomonovych@xxxxxxxxx>
- [patch] crypto: ccp - Free ccp if initialization fails
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v4 0/6] crypto: switch to crypto API for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] Crypto: fixed a comment coding style issue
- From: Aditya Parekh <kerneladi@xxxxxxxxx>
- Re: [PATCH v4 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH v2 26/26] crypto: chelsio/aes - replace AES cipher calls with library calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 25/26] crypto: ccp - move to AES library for CMAC key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 23/26] bluetooth: switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 24/26] crypto: amcc/aes - switch to AES library for GCM key derivation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 22/26] crypto: arm/ghash - provide a synchronous version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 21/26] crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 20/26] crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 19/26] crypto: aes/arm - use native endiannes for key schedule
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 17/26] crypto: aes - move sync ctr(aes) to AES library and generic helper
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 18/26] crypto: arm64/aes-ce-cipher - use AES library as fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/26] crypto: ctr - add helper for performing a CTR encryption walk
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/26] crypto: generic/aes - drop key expansion routine in favor of library version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/26] crypto: arm64/aes-ce - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/26] crypto: arm64/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/26] crypto: arm64/aes-ccm - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/26] crypto: arm64/ghash - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/26] crypto: arm/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/26] crypto: safexcel/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/26] crypto: x86/aes - drop scalar assembler implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/26] crypto: cesa/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/26] crypto: padlock/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/26] crypto: aes - create AES library based on the fixed time AES code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/26] crypto: x86/aes-ni - switch to generic for fallback and key routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/26] crypto: aes/fixed-time - align key schedule with other implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/26] crypto: aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/26] crypto: arm/aes-ce - cosmetic/whitespace cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/26]crypto: AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 01/30] crypto: des/3des_ede - add new helpers to verify key length
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 01/30] crypto: des/3des_ede - add new helpers to verify key length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 27/30] crypto: des - split off DES library from generic DES cipher driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 30/30] fs: cifs: move from the crypto cipher API to the new DES library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 28/30] crypto: x86/des - switch to library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 29/30] crypto: des - remove now unused __des3_ede_setkey()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 26/30] crypto: des - remove unused function
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 25/30] crypto: 3des - move verification out of exported routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 24/30] crypto: ux500/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 23/30] crypto: talitos/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 21/30] crypto: stm32/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 22/30] crypto: sun4i/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 19/30] crypto: qce/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 20/30] crypto: rk3288/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 17/30] crypto: omap/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 18/30] crypto: picoxcell/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 16/30] crypto: n2/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 15/30] crypto: cesa/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 14/30] crypto: ixp4xx/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 13/30] crypto: safexcel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 12/30] crypto: hisilicon/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 11/30] crypto: hifn/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 10/30] crypto: ccree/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 09/30] crypto: ccp/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 08/30] crypto: nitrox/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 07/30] crypto: cpt/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 06/30] crypto: caam/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 05/30] crypto: bcm/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 04/30] crypto: atmel/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 03/30] crypto: sparc/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 02/30] crypto: s390/des - switch to new verification routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 01/30] crypto: des/3des_ede - add new helpers to verify key length
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 00/30] crypto: DES/3DES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 5/6] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 4/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 3/6] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 2/6] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- [PATCH v4 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] tpm: block messages while suspended
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH net-next v2 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fscrypt: remove selection of CONFIG_CRYPTO_SHA256
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] fscrypt: remove selection of CONFIG_CRYPTO_SHA256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: crypto: crypto4xx - properly set IV after de- and encrypt breaks kernel 4.4
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: crypto: crypto4xx - properly set IV after de- and encrypt breaks kernel 4.4
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- crypto: crypto4xx - properly set IV after de- and encrypt breaks kernel 4.4
- From: Hauke Mehrtens <hauke@xxxxxxxxxx>
- Re: [PATCH v2] crypto: nx: no need to check return value of debugfs_create functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] crypto: rc4 cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix max key size for sha384 and sha512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Document CTR mode counter width quirks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: caam - update IV using HW support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/6] fs: crypto: invoke crypto API for ESSIV handling
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v2 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 0/1] net: fastopen: follow-up tweaks for SipHash switch
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v2 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH net-next v3 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH net-next v3 0/1] net: fastopen: follow-up tweaks for SipHash switch
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v2 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 6/6] crypto: arm64/aes - implement accelerated ESSIV/CBC mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 5/6] crypto: essiv - add test vector for essiv(cbc(aes),aes,sha256)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/6] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 3/6] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/6] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/6] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/6] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- RE: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH net-next v2 1/1] net: fastopen: robustness and endianness fixes for SipHash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH net-next v2 0/1] net: fastopen: follow-up tweaks for SipHash switch
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] net: fastopen: use endianness agnostic representation of the cookie
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH v2 4/4] md: dm-crypt: switch to ESSIV crypto API template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/4] md: dm-crypt: infer ESSIV block cipher from cipher string directly
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/4] fs: crypto: invoke crypto API for ESSIV handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: essiv - create wrapper template for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: switch to crypto API for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1 01/22] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v1 12/22] docs: driver-api: add .rst files from the main dir
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v1 11/22] docs: admin-guide: add .rst files from the main dir
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH V2] crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [EXTERNAL] Re: crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] net: fastopen: use endianness agnostic representation of the cookie
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] net: fastopen: use endianness agnostic representation of the cookie
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: testmgr - dynamically allocate crypto_shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: testmgr - dynamically allocate testvec_config
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] [v2] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss - reduce stack usage
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: asymmetric_keys - select CRYPTO_HASH where needed
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] [v2] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH 0/2] net: fastopen: follow-up tweaks for SipHash switch
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] net: fastopen: follow-up tweaks for SipHash switch
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [PATCH 2/2] net: fastopen: use endianness agnostic representation of the cookie
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] net: fastopen: make key handling more robust against future changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] net: fastopen: follow-up tweaks for SipHash switch
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: testmgr - dynamically allocate crypto_shash
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 1/2] crypto: testmgr - dynamically allocate testvec_config
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v5 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - add support for PCI based FPGA development board
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - make driver selectable for non-Marvell hardware
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - broaden driver scope
- From: Pascal van Leeuwen <pascalvanl@xxxxxxxxx>
- Re: [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4] wusb: switch to cbcmac transform
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam - correct DMA address size for the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v3 4/5] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v4 3/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v4 2/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v4 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v4 1/4] lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v4 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 4/5] crypto: caam - simplfy clock initialization
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam - correct DMA address size for the i.MX8
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH v3 2/5] crypto: caam - correct DMA address size for the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v3 3/5] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v3 5/5] crypto: caam - add clock entry for i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v3 4/5] crypto: caam - simplfy clock initialization
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v3 1/5] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v3 0/5] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- RE: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: x86/crct10dif-pcl - cleanup and optimizations
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH] crypto: sun4i-ss - reduce stack usage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: testmgr - reduce stack usage in fuzzers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: serpent - mark __serpent_setkey_sbox noinline
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: add HW engine config check
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: prevent isr handling in case driver is suspended
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: ccree: check that cryptocell reset completed
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: Relocate driver irq registration after clk init
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: ccree: minor fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3] wusb: switch to cbcmac transform
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3] wusb: switch to cbcmac transform
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v3] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto/NX: Set receive window credits to max number of CRBs in RxFIFO
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Issue with sg_copy_to_buffer() ? (was Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.)
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2] wusb: switch to cbcmac transform
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH AUTOSEL 5.1 26/59] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Jason Baron <jbaron@xxxxxxxxxx>
- Re: [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [PATCH v2] crypto: nx: no need to check return value of debugfs_create functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: nx: no need to check return value of debugfs_create functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH] net: ipv4: move tcp_fastopen server side code to SipHash library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] wusb: switch to cbcmac transform
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] wireless: airo: switch to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] lib80211: use crypto API ccm(aes) transform for CCMP processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 3/3] fscrypt: switch to ESSIV shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 2/3] dm crypt: switch to essiv shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/3] crypto: essiv - create a new shash template for IV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/3] crypto: switch to shash for ESSIV generation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: user - fix potential warnings in cryptouser.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - improve the skcipher API example code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add some more preemption points
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20poly1305 - a few cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: bcm - Make some symbols static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Use the correct style for SPDX License Identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - use struct_size() helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: mxs-dcp - Use devm_platform_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] crypto: rc4 cleanup
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] crypto: rc4 cleanup
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v5 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/20] crypto: arm/aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- [PATCH] wusb: switch to cbcmac transform
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/20] AES cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- Re: [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix max key size for sha384 and sha512
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v3 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- [RFC PATCH 20/20] crypto: arm/ghash - provide a synchronous version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 19/20] crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 17/20] crypto: aes - move ctr(aes) non-SIMD fallback to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 18/20] crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 15/20] crypto: generic/aes - drop key expansion routine in favor of library version
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 16/20] crypto: arm64/aes-ce-cipher - use AES library as fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 14/20] crypto: arm64/aes-ce - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 13/20] crypto: arm64/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 12/20] crypto: arm64/aes-ccm - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 11/20] crypto: arm/aes-neonbs - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 10/20] crypto: arm64/ghash - switch to AES library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 09/20] crypto: safexcel/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 06/20] crypto: x86/aes - drop scalar assembler implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 08/20] crypto: cesa/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 04/20] crypto: aes - create AES library based on the fixed time AES code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 07/20] crypto: padlock/aes - switch to library version of key expansion routine
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 05/20] crypto: x86/aes-ni - switch to generic for fallback and key routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 03/20] crypto: aes/fixed-time - align key schedule with other implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 02/20] crypto: arm/aes - rename local routines to prevent future clashes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 01/20] crypto: arm/aes-ce - cosmetic/whitespace cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 00/20] AES cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v2 4/4] s390/crypto: sha: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 3/4] s390/crypto: prng: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 2/4] s390/crypto: ghash: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 1/4] s390/pkey: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 0/4] s390/crypto: Use -ENODEV instead of -EOPNOTSUPP
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - fix max key size for sha384 and sha512
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v4 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3 7/7] fs: cifs: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 6/7] ppp: mppe: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 2/4] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 4/4] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 3/4] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 1/4] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 0/4] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v1 0/5] Additional fixes on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v11 11/13] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 13/13] ima: Allow template= option for appraise rules as well
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 10/13] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 09/13] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 04/13] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 01/13] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v11 00/13] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH] crypto: vmx - Document CTR mode counter width quirks
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v7 00/12] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: caam - use len instead of nents for bulding HW S/G table
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: caam - update IV using HW support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - update IV using HW support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v3 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Steve French <smfrench@xxxxxxxxx>
- Re: [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: arc4 - remove cipher implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/7] ppp: mppe: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 7/7] fs: cifs: switch to RC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/7] net/lib80211: move WEP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/7] net/lib80211: move TKIP handling to ARC4 library code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/7] net/mac80211: move WEP handling to ARC4 library interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: arc4 - refactor arc4 core code into separate library
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: rc4 cleanup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: user - fix potential warnings in cryptouser.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: caam - always select job ring via RSR on i.MX8MQ
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 3/4] crypto: caam - correct DMA address size for the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 2/4] crypto: caam - move DMA mask selection into a function
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 1/4] crypto: caam - do not initialise clocks on the i.MX8
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- [PATCH v2 0/4] crypto: caam - Add i.MX8MQ support
- From: Andrey Smirnov <andrew.smirnov@xxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 3/3] lib80211/wep: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 2/3] lib80211/tkip: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 1/3] net/mac80211: switch to skcipher interface for arc4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 0/3] move WEP implementation to skcipher interface
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: "Saidi, Ali" <alisaidi@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: (2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: talitos - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 2/2] crypto: sahara - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/2] crypto: mxs-dcp - Use devm_platform_ioremap_resource()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [PATCH] crypto: qat - use struct_size() helper
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH] crypto: hisilicon - Use the correct style for SPDX License Identifier
- From: Nishad Kamdar <nishadkamdar@xxxxxxxxx>
- RE:(2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- [PATCH v1 2/5] crypto: talitos - move struct talitos_edesc into talitos.h
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 5/5] crypto: talitos - drop icv_ool
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 4/5] crypto: talitos - eliminate unneeded 'done' functions at build time
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 3/5] crypto: talitos - fix hash on SEC1.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 1/5] crypto: talitos - fix ECB and CBC algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 0/5] Additional fixes on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: mmotm 2019-06-04-16-33 uploaded (drivers/crypto/atmel)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] ARM: dts: imx7ulp: add crypto support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: chacha20poly1305 - fix atomic sleep when using async algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]