Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: lrw - use correct alignmask
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - test the shash API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha2-ce - correct digest for empty data in finup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha1-ce - correct digest for empty data in finup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Jitter RNG - update implementation to 2.1.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/14] crypto: inside-secure - self-test fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: mmotm 2019-06-04-16-33 uploaded (drivers/crypto/atmel)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: "Saidi, Ali" <alisaidi@xxxxxxxxxx>
- Re: [PATCH 0/3] Add support for Graviton TRNG
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: David Sterba <dsterba@xxxxxxx>
- [PATCH] crypto: cavium/nitrox - Use the correct style for SPDX License Identifier
- From: Nishad Kamdar <nishadkamdar@xxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] Add support for Graviton TRNG
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 2/3] arm64: export acpi_psci_use_hvc
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 3/3] hwrng: Add support for AWS Graviton TRNG
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH 1/3] arm/arm64: Add smccc hypervisor service identifiers
- From: Ali Saidi <alisaidi@xxxxxxxxxx>
- [PATCH -next] crypto: bcm - Make some symbols static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- RE:(2) [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- RE:(2) [PATCH 0/4] zstd: reduce stack usage
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Re: Question about padata's callback cpu
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 0/4] zstd: reduce stack usage
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] zstd: move params structure to global variable to reduce stack usage
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] zstd: change structure variable from int to char
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 3/4] zstd: move params structure to global variable to reduce stack usage
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 2/4] zstd: use U16 data type for rankPos
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 1/4] zstd: pass pointer rathen than structure to functions
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 0/4] zstd: reduce stack usage
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add some more preemption points
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: doc - improve the skcipher API example code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: chacha - constify ctx and iv arguments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: chacha20poly1305 - a few cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - make chunksize and walksize accessors internal
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - un-inline encrypt and decrypt functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: aead - un-inline encrypt and decrypt functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aesni - remove unused internal cipher algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: doc - improve the skcipher API example code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - add some more preemption points
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: make all generic algorithms set cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: algapi - require cra_name and cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: make cra_driver_name mandatory
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - fix license comment syntax error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500 - fix license comment syntax error
- From: "Alex Xu (Hello71)" <alex_y_xu@xxxxxxxx>
- [PATCH 3/4] drivers: crypto: picoxcell_crypto: use MODULE_DECLARE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 4/4] drivers: ata: use MODULE_DECLARE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 1/4] mod_devicetable: helper macro for declaring oftree module device table
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- RFC: declaring DT match tables (2nd take)
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 2/4] drivers: block: xsysace: use MODULE_DECLARE_OF_TABLE() and of_match_ptr()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: chacha20poly1305 - fix atomic sleep when using async algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH 1/3] mod_devicetable: helper macro for declaring oftree module device table
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 3/3] drivers: crypto: picoxcell_crypto: use MODULE_OF_TABLE()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH 2/3] drivers: block: xsysace: use MODULE_OF_TABLE() and of_match_ptr()
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- RFC: get rid of #ifdef CONFIG_OF's around of match tables
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- [PATCH] crypto: caam - disable some clock checks for iMX7ULP
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: atmel-i2c - Fix build error while CRC16 set to m
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH] crypto: pcrypt: Fix possible deadlock in padata_sysfs_release
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] crypto: pcrypt: Fix possible deadlock in padata_sysfs_release
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- [PATCH] crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto: atmel - Fix sparse endianness warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: lrw - use correct alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ghash - fix unaligned memory access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Issues with initialising generic crypto implementations earlier on ARMv7
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: gcm - fix cacheline sharing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH] crypto: gcm - fix cacheline sharing
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v2 0/6] crypto - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: caam - print IV only when non NULL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi - remove crypto_tfm_in_queue()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - remove CRYPTO_ALG_TYPE_DIGEST
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - move kcrypto_wq into cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gf128mul - make unselectable by user
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: echainiv - change to 'default n'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: make all templates select CRYPTO_MANAGER
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - make extra tests depend on cryptomgr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - fix length truncation with large page size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to skcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: hw_random: meson-rng: update with SPDX Licence identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [cryptodev:master 56/59] drivers/crypto/atmel-i2c.c:39:18: sparse: sparse: incorrect type in assignment (different base types)
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Can an ahash driver be used through shash API?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Issues with initialising generic crypto implementations earlier on ARMv7
- From: Robin Murphy <robin.murphy@xxxxxxx>
- RE: [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- RE: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Issues with initialising generic crypto implementations earlier on ARMv7
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Allow working with key references
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] crypto: mxs-dcp: Implement reference keys
- From: Richard Weinberger <richard@xxxxxx>
- [RFC PATCH 1/2] crypto: Allow working with key references
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: gcm - fix cacheline sharing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: Jitter RNG - update implementation to 2.1.2
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: gcm - fix cacheline sharing
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: Conding style question regarding configuration
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v3] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: Can an ahash driver be used through shash API?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Can an ahash driver be used through shash API?
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Question about padata's callback cpu
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - test the shash API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: testmgr - test the shash API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: Conding style question regarding configuration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Conding style question regarding configuration
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] arm64 sha2-ce finup: correct digest for empty data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] arm64 sha2-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- [PATCH] arm64 sha1-ce finup: correct digest for empty data
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- [PATCH v2] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- [bug report] crypto: qat - Intel(R) QAT driver framework
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v5 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v5 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 08/15] crypto: talitos - Do not modify req->cryptlen on decryption.
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/14] crypto: inside-secure - unify cache reset
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/14] crypto: inside-secure - remove useless check
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/14] crypto: inside-secure - move comment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 13/14] crypto: inside-secure - fix use of the SG list
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 14/14] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/14] crypto: inside-secure - add support for HMAC updates
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/14] crypto: inside-secure - implement IV retrieval
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/14] crypto: inside-secure - fix zeroing of the request in ahash_exit_inv
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/14] crypto: inside-secure - fix queued len computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/14] crypto: inside-secure - self-test fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/14] crypto: inside-secure - enable context reuse
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/14] crypto: inside-secure - change returned error when a descriptor reports an error
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/14] crypto: inside-secure - improve the result error format when displayed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/14] crypto: inside-secure - fix coding style for a condition
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/14] crypto: inside-secure - remove empty line
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- inside secure driver update
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: atmel-ecc: factor out code that can be shared
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] crypto - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] crypto: caam: print messages in caam_dump_sg at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam: print IV only when non NULL
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam: remove unused defines
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 1/2] crypto: crypto4xx - fix blocksize for cfb and ofb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - print debugging hex dumps after unmapping
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - AES CFB mode is a stream cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] arm/sha512 - Make sha512_arm_final static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: caam - IOMMU support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ixp4xx - Fix cross-compile errors due to type mismatch
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha512 - make function static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 082/317] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 065/244] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 042/167] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 027/114] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: arm/sha512 - make function static
- From: Philippe Mazenauer <philippe.mazenauer@xxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: jitterentropy - change back to module_init()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Extra selftests failure on Talitos SEC1 hash algs - how can I identify the issue ?
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 3/3] crypto: caam: print messages in caam_dump_sg at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 1/3] crypto: caam: remove unused defines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 08/15] crypto: talitos - Do not modify req->cryptlen on decryption.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 11/15] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 09/15] crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 12/15] crypto: talitos - fix AEAD processing.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 13/15] Revert "crypto: talitos - export the talitos_submit function"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 14/15] crypto: talitos - use IS_ENABLED() in has_ftr_sec1()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 15/15] crypto: talitos - use SPDX-License-Identifier
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 06/15] crypto: talitos - check data blocksize in ablkcipher.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 07/15] crypto: talitos - fix ECB algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 04/15] crypto: talitos - check AES key size
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 03/15] crypto: talitos - reduce max key size for SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 01/15] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 10/15] crypto: talitos - properly handle split ICV.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 05/15] crypto: talitos - fix CTR alg blocksize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to skcipher API
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v7 00/12] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v6 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: algapi - remove crypto_tfm_in_queue()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: hash - remove CRYPTO_ALG_TYPE_DIGEST
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cryptd - move kcrypto_wq into cryptd
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: gf128mul - make unselectable by user
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: echainiv - change to 'default n'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: make all templates select CRYPTO_MANAGER
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - make extra tests depend on cryptomgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - fix length truncation with large page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] char: hw_random: meson-rng: update with SPDX Licence identifier
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [STABLE PATCH 0/2] crypto: ccree: fixes backport to 4.19
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 2/2] crypto: ccree: fix backlog notifications
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 0/2] crypto: ccree: fixes backport to 4.19
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: skcipher - perform len fits into blocksize check at the top
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH] crypto: skcipher - perform len fits into blocksize check at the top
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 2/2] crypto: crypto4xx - block ciphers should only accept complete blocks
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 1/2] crypto: crypto4xx - fix blocksize for cfb and ofb
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 4.4,4.9] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 4.4,4.9,4.14] crypto: salsa20 - don't access already-freed walk.iv
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4] crypto: chacha20poly1305 - set cra_name correctly
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 4.4 2/2] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 4.4 2/2] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4 1/2] crypto: gcm - Fix error return code in crypto_gcm_create_common()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4] crypto: chacha20poly1305 - set cra_name correctly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4,4.9] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.14] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4,4.9,4.14] crypto: salsa20 - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caam: print messages in caam_dump_sg at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: CAAM: Print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: caam: remove unused defines
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Can scatterlist elements cross page boundary ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Can crypto API provide information about hw acceleration?
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: Can scatterlist elements cross page boundary ?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Can scatterlist elements cross page boundary ?
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - fix pkcs1pad input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel stack is corrupted in: generate_random_hash_testvec
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - Fix 3DES complaint from ccp-crypto module
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/3] crypto: ccp - fix AES CFB error exposed by new test vectors
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/3] crypto: ccp - AES CFB mode is a stream cipher
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: Can crypto API provide information about hw acceleration?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: caam - fix pkcs1pad input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Can crypto API provide information about hw acceleration?
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- crypto: Kernel stack is corrupted in: generate_random_hash_testvec
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next] arm/sha512 - Make sha512_arm_final static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Ray Jui <ray.jui@xxxxxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 2/2] hwrng: iproc-rng200: Add support for 7211
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: potential underfow in crypto/lrw.c setkey() setkey
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug 203559] New: usercopy_abort triggered by build_test_sglist
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Bug 203559] New: usercopy_abort triggered by build_test_sglist
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 4/5] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: atmel-ecc: factor out code that can be shared
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- potential underfow in crypto/lrw.c setkey() setkey
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto:chelsio Fix NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 2/3] dt-bindings: rng: update bindings for MT67xx SoCs
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 0/3] MT67XX random number generator support
- From: <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: x86/glue_helper: Add static inline function glue macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/7] crypto: x86/camellia: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/7] crypto: x86/crypto: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 7/7] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/7] crypto: x86/twofish: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: x86/aesni: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/7] crypto: x86/cast6: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 64/95] crypto: testmgr - add AES-CFB tests
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [GIT] Crypto Update for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Fwd: [Bug 203515] [crypto] alg: skcipher: p8_aes_ctr encryption test failed (wrong result) on test vector 3, cfg="uneven misaligned splits, may sleep"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Fwd: [Bug 203515] New: [crypto] alg: skcipher: p8_aes_ctr encryption test failed (wrong result) on test vector 3, cfg="uneven misaligned splits, may sleep"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [GIT] Crypto Update for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 7/7] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 6/7] crypto: caam/qi - DMA map keys using proper device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 5/7] crypto: caam/qi - fix address translations with IOMMU enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 2/7] crypto: caam - fix S/G table passing page boundary
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 4/7] crypto: caam/qi - don't allocate an extra platform device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 1/7] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 0/7] crypto: caam - IOMMU support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: use a proper le32 type for le32 val
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH next 02/25] crypto: picoxcell: Use dev_get_drvdata()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: stm32/cryp - add weak key check for DES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- RE: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] MAINTAINERS: Maintainer for Chelsio crypto driver
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 3/4] crypto:chelsio count incomplete block in IV
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 2/4] crypto:chelsio Fix softlockup with heavy I/O
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/4] crypto:chelsio Fix NULL pointer dereference
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH V3 1/4] dt-bindings: crypto: Add bindings for ZynqMP SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 4/4] ARM64: zynqmp: Add Xilinix SHA-384 node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 3/4] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 2/4] firmware: xilinx: Add ZynqMP sha_hash API for SHA3 functionality
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- Re: [PATCH 1/5] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] X.509: Add messages for obsolete OIDs
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- RE: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] crypto: atmel-ecc: factor out code that can be shared
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] synquacer - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: crypto: akcipher: userspace API?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: akcipher: userspace API?
- From: Marek Behun <marek.behun@xxxxxx>
- [PATCH 7/7] crypto: qat - do not offload zero length requests
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 6/7] crypto: qat - return error for block ciphers for invalid requests
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 5/7] crypto: qat - return proper error code in setkey
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 4/7] crypto: qat - fix block size for aes ctr mode
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 3/7] crypto: qat - update iv after encryption or decryption operations
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 2/7] crypto: qat - add check for negative offset in alg precompute function
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: ccree: use a proper le32 type for le32 val
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: cc_sec_disable can be static
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]