Linux Crypto
[Prev Page][Next Page]
- [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [PATCH 0/7] crypto: caam - IOMMU support
- From: Franck Lenormand <franck.lenormand@xxxxxxx>
- [cryptodev:master 136/163] drivers/crypto/ccree/cc_driver.c:112:16: sparse: sparse: cast to restricted __le32
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH cryptodev] crypto: cc_sec_disable can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 130/163] drivers/crypto/ccree/cc_driver.c:38:6: sparse: sparse: symbol 'cc_sec_disable' was not declared. Should it be static?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 6/7] crypto: caam/qi - DMA map keys using proper device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 5/7] crypto: caam/qi - fix address translations with IOMMU enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/7] crypto: caam - fix S/G table passing page boundary
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 4/7] crypto: caam/qi - don't allocate an extra platform device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/7] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 2/3] crypto: caam/qi2 - fix DMA mapping of stack memory
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/3] crypto: caam/qi2 - generate hash keys in-place
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam/qi2 - fix zero-length buffer DMA mapping
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: sun4i-ss: Fix problem reported by CONFIG_CRYPTO_EXTRA_TESTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Fix HW family part name format
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - update gcm detection logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: remove shash_desc::flags
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] crypto: stm32/cryp - update to return iv_out
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/3] crypto: stm32/cryp - add weak key check for DES
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] crypto: stm32/cryp - remove request mutex protection
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: <Nicolas.Ferre@xxxxxxxxxxxxx>
- [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH v2] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_gcm_init_common
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 23 (crypto/ecrdsa)
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 23 (crypto/ecrdsa)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH next 02/25] crypto: picoxcell: Use dev_get_drvdata()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto4xx: fix cfb and ofb "overran dst buffer" issues
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: Crypto API AEAD question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto API AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto4xx: fix cfb and ofb "overran dst buffer" issues
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 3/4] crypto4xx: use sync skcipher for fallback
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 4/4] crypto4xx: get rid of redundant using_sd variable
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- RE: [RFC PATCH V2 3/4] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v5 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: stm32/hash - Fix self test issue during export
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: powerpc - convert to use crypto_simd_usable()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: shash - fix missed optimization in shash_ahash_digest()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium - remove bogus code handling cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - remove ability to instantiate ablkciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rockchip - update IV buffer to contain the next IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: remove set but not used variable 'fini'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara: Convert IS_ENABLED uses to __is_defined
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Do not free psp_master when PLATFORM_INIT fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/35] crypto: ccree: add support for sec disabled mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/35] crypto: ccree: fix backlog notifications
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/35] crypto: ccree: add CID and PID support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 35/35] crypto: ccree: handle tee fips error during power management resume
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 34/35] crypto: ccree: add function to handle cryptocell tee fips error
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 27/35] crypto: ccree: use correct internal state sizes for export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 26/35] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/35] crypto: ccree: fix typo in debugfs error path
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 33/35] crypto: ccree: HOST_POWER_DOWN_EN should be the last CC access during suspend
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 32/35] crypto: ccree: remove cc7x3 obsoleted AXIM configs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 31/35] crypto: ccree: pm resume first enable the source clk
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 30/35] crypto: ccree: don't map AEAD key and IV on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 29/35] crypto: ccree: don't map MAC key on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 28/35] crypto: ccree: allow more AEAD assoc data fragments
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 25/35] crypto: ccree: make AEAD sgl iterator well behaved
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 22/35] crypto: ccree: simplify fragment ICV detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/35] crypto: ccree: remove special handling of chained sg
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 24/35] crypto: ccree: don't mangle the request assoclen
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 23/35] crypto: ccree: simplify AEAD ICV addr calculation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 21/35] crypto: ccree: remove unused defines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 18/35] crypto: ccree: copyright header update
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 20/35] crypto: ccree: do not copy zero size MLLI table
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 19/35] crypto: ccree: zero out internal struct before use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 17/35] crypto: ccree: use std api when possible
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 16/35] crypto: ccree: use devm_kzalloc for device data
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 15/35] crypto: ccree: fix mem leak on error path
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/35] crypto: ccree: use proper callback completion api
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/35] crypto: ccree: read next IV from HW
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/35] crypto: ccree: adapt CPP descriptor to new HW
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/35] crypto: ccree: add SM4 protected keys support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/35] crypto: ccree: add remaining logic for CPP
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/35] crypto: ccree: add CPP completion handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/35] crypto: ccree: move MLLI desc. before key load
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/35] crypto: ccree: move key load desc. before flow desc.
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/35] crypto: testmgr: add missing self test entries for protected keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: sun4i-ss: Fix invalid calculation of hash end
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/4] crypto: sun4i-ss: fallback when length is not multiple of blocksize
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/4] crypto: sun4i-ss: remove ivsize from ECB
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/4] crypto: sun4i-ss: Handle better absence/presence of IV
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/4] crypto: sun4i-ss: Fix problem reported by CONFIG_CRYPTO_EXTRA_TESTS
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 10/12] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 07/12] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 05/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 04/12] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Fix HW family part name format
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] crypto: caam/jr - update gcm detection logic
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/26] compat_ioctl: cleanups
- From: Douglas Gilbert <dgilbert@xxxxxxxxxxxx>
- [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 00/26] compat_ioctl: cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: caam/jr - update gcm detection logic
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Hao Feng <fenghao@xxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH 0/6] Add Hygon SEV support
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 3/6] crypto: ccp: Implement SEV_GM_PUBKEY_GEN ioctl command
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 2/6] crypto: ccp: Define Hygon SEV commands
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 1/6] crypto: ccp: Add Hygon Dhyana support
- From: Hao Feng <fenghao@xxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: [PATCH 0/2] hwrng: stm32 - Fix issue and add default quality level
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [v2 PATCH] crypto: xts - Fix atomic sleep when walking skcipher
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: lrw - Fix atomic sleep when walking skcipher
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: lrw - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: nx - don't abuse shash MAY_SLEEP flag
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] crypto: shash - remove shash_desc::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 2/3] crypto: nx - don't abuse shash MAY_SLEEP flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 0/3] crypto: remove shash_desc::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 1/3] crypto: shash - remove useless crypto_yield() in shash_ahash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: shash - fix missed optimization in shash_ahash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: xts - Fix atomic sleep when walking skcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- crypto: lrw - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- BUG: sleeping function called from invalid context at crypto/skcipher.c:LINE
- From: syzbot <syzbot+6f72c20560060c98b566@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: powerpc - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cavium - remove bogus code handling cryptd
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cryptd - remove ability to instantiate ablkciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- [PATCH] crypto: rockchip - update IV buffer to contain the next IV
- From: Zhang Zhijie <zhangzj@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFC PATCH] chtls_rsk_opsv6 can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 7/7] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: testmgr - fuzz AEADs against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: testmgr - identify test vectors by name rather than number
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: testmgr - fuzz hashes against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: testmgr - expand ability to test for errors
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: testmgr - add helpers for fuzzing against generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: testmgr - fuzz skciphers against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 3/4] crypto/chelsio/chtls: CPL for TLS client
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] crypto/chelsio/chtls: chtls_sock_release() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [crypto 2/4] crypto/chelsio/chtls: hardware connect API
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 4/4] IPv6 changes for Inline TLS
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [crypto 4/4] IPv6 changes for Inline TLS
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 1/4] net/tls: connect routine for Inine TLS Client
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- [PATCH v9 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH 22/24] crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Benjamin Tissoires <benjamin.tissoires@xxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 22/24] crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/24] crypto: rockchip - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/24] crypto: qce - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/24] crypto: picoxcell - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/24] crypto: omap - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/24] crypto: n2 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/24] crypto: talitos - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/24] crypto: marvell - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/24] crypto: ux500 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/24] crypto: nitrox - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/24] crypto: ixp4xx - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/24] crypto: inside-secure - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/24] crypto: hifn_795x - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/24] crypto: hisilicon - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/24] crypto: ccp - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/24] crypto: cavium - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/24] crypto: bcm - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/24] crypto: s390 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/24] crypto: atmel - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/24] crypto: sparc - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/24] crypto: des_generic - Forbid 2-key in 3DES and add helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/24] Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Rik van Riel <riel@xxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/7] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 2/7] crypto: salsa20 - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 4/7] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: salsa20 - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: vmx - return correct error code on failed setkey
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: lrw - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: remove set but not used variable 'fini'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: Convert IS_ENABLED uses to __is_defined
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [crypto 4/4] IPv6 changes for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 3/4] crypto/chelsio/chtls: CPL for TLS client
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 2/4] crypto/chelsio/chtls: hardware connect API
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 1/4] net/tls: connect routine for Inine TLS Client
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: ccp: Do not free psp_master when PLATFORM_INIT fails
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: stm32/hash - Fix self test issue during export
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 00/18] crypto: fuzz algorithms against their generic implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add panic_on_fail module parameter
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: scompress: return proper error code for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: introduce SEV_GET_ID2 command
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4 03/17] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 06/17] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 08/17] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 05/17] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 10/17] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 02/17] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/17] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 09/17] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 14/17] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 16/17] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 11/17] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 17/17] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 13/17] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 12/17] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 15/17] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/17] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 00/17] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 08/18] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] padata: Replace padata_attr_type default_attrs field with groups
- From: Kimberly Brown <kimbrownkd@xxxxxxxxx>
- [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Kimberly Brown <kimbrownkd@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 07/18] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- crypto: mxc-scc - Remove broken driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: Should we consider removing Streebog from the Linux Kernel?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Block layer does not call add_disk_randomness any more
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: Should we consider removing Streebog from the Linux Kernel?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: stm32 - set default random quality
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/2] hwrng: stm32 - Fix issue and add default quality level
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/2] hwrng: stm32 - fix unbalanced pm_runtime_enable
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 06/18] crypto: chacha20poly1305 - set cra_name correctly
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 01/18] crypto: x86/poly1305 - fix overflow during partial reduction
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] crypto: testmgr - add panic_on_fail module parameter
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 06/18] crypto: chacha20poly1305 - set cra_name correctly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 11/18] crypto: arm64/cbcmac - handle empty messages in same way as template
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 17/18] crypto: testmgr - fuzz AEADs against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 08/18] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 10/18] crypto: cts - don't support empty messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 12/18] crypto: testmgr - expand ability to test for errors
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 14/18] crypto: testmgr - add helpers for fuzzing against generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 13/18] crypto: testmgr - identify test vectors by name rather than number
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 16/18] crypto: testmgr - fuzz skciphers against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 15/18] crypto: testmgr - fuzz hashes against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 07/18] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 01/18] crypto: x86/poly1305 - fix overflow during partial reduction
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 05/18] crypto: skcipher - don't WARN on unprocessed data after slow walk step
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 02/18] crypto: crct10dif-generic - fix use via crypto_shash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 00/18] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 03/18] crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] KEYS: asym_tpm: move setting set_pub_key parameters into derive_pub_key
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 4/6] dt-bindings: firmware: Document cznic,turris-mox-rwtm binding
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 1/6] dt-bindings: mailbox: Document armada-3700-rwtm-mailbox binding
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 2/6] mailbox: Add support for Armada 37xx rWTM mailbox
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 6/6] firmware: turris-mox-rwtm: Add sysfs documentation
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 0/6] Armada 37xx mailbox + Turris
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 5/6] firmware: Add Turris Mox rWTM firmware driver
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 3/6] arm64: dts: marvell: armada-37xx: add mailbox node
- From: Marek Behún <marek.behun@xxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 35/57] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 36/57] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 20/37] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 21/37] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 12/21] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 13/21] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 10/16] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 09/16] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: scompress: return proper error code for allocation failure
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH v2] crypto: ccp: introduce SEV_GET_ID2 command
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: KASAN: use-after-free Read in generic_gcmaes_encrypt
- From: syzbot <syzbot+6d3612ba5e254e387153@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH -next] crypto: vmx - Make p8_init and p8_exit static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - Make cptvf_device_init static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: brcm - remove unused array tag_to_hash_idx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: zip - Make some functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - Make some functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - remove unused fucntions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: chtls - handle inet_csk_reqsk_queue_add() failures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 067/262] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 068/262] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 216/262] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 050/192] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 049/192] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 160/192] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 034/123] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 035/123] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 101/123] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 25/87] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 70/87] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 52/63] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 3.18 33/41] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Riku Voipio <riku.voipio@xxxxxx>
- Bad file pattern in MAINTAINERS section 'IBM Power in-Nest Crypto Acceleration'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Zhang Zhijie <zhangzj@xxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Should we consider removing Streebog from the Linux Kernel?
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: David Miller <davem@xxxxxxxxxxxxx>
- [RFC v7.1] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_free_resources_tx
- From: syzbot <syzbot+503339bf3c9053b8a7fc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH net-next v9 01/19] asm: simd context helper API
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: Kconfig - fix typos AEGSI -> AEGIS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: salsa20-generic - use crypto_xor_cpy()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha-generic - use crypto_xor_cpy()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - reduce kernel stack usage with clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: omap - Set default quality
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: test the !may_use_simd() fallback code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: add SIMD helpers for AEADs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH net-next v9 07/19] zinc: Poly1305 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 06/19] zinc: ChaCha20 MIPS32r2 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 04/19] zinc: ChaCha20 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 03/19] zinc: ChaCha20 generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 02/19] zinc: introduce minimal cryptography library
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 01/19] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 08/19] zinc: Poly1305 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 10/19] zinc: Poly1305 MIPS64 and MIPS32r2 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 09/19] zinc: Poly1305 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 13/19] zinc: BLAKE2s x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 11/19] zinc: ChaCha20Poly1305 construction and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 15/19] zinc: Curve25519 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 14/19] zinc: Curve25519 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 17/19] zinc: Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 18/19] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 16/19] zinc: import Bernstein and Schwabe's Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 8/17] zinc: Add generic C implementation of poly1305 and self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/17] zinc: BLAKE2s x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/17] zinc: Add x86 accelerated poly1305
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/17] zinc: ChaCha20Poly1305 construction and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/17] zinc: import Bernstein and Schwabe's Curve25519 ARM implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/17] zinc: Curve25519 ARM implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/17] zinc: BLAKE2s generic C implementation and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/17] security/keys: rewrite big_key crypto to use Zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/17] zinc: Curve25519 x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/17] zinc: Curve25519 generic C implementations and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/17] zinc: Add x86 accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/17] crypto: poly1305 - Export core functions without crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/17] zinc: Add generic C implementation of chacha20 and self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/17] zinc: Add arm accelerated chacha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/17] crypto: chacha20 - Export chacha20 functions without crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/17] asm: simd context helper API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/17] zinc: introduce minimal cryptography library
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] X.509: Add messages for obsolete OIDs
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v3 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 2/3] crypto: caam/jr - Removed redundant vars from job ring private data
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC PATCH] crypto: chtls - handle inet_csk_reqsk_queue_add() failures
- From: Guillaume Nault <gnault@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Gael PORTAY <gael.portay@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: caam/jr - Removed redundant vars from job ring private data
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH -next] crypto: vmx - Make p8_init and p8_exit static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [Bug] STM32 crc driver failed on selftest 1
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Bug] STM32 crc driver failed on selftest 1
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: KASAN: use-after-free Read in crypto_gcm_init_common
- From: syzbot <syzbot+e736399a2c4054612307@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14] crypto: arm64/aes-neonbs - fix returning final keystream block
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14] crypto: arm64/aes-neonbs - fix returning final keystream block
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 1/3] arm64: dts: exynos: add SlimSSS for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Gary R Hook <ghook@xxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - Make cptvf_device_init static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: brcm - remove unused array tag_to_hash_idx
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: zip - Make some functions static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - Make some functions static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - remove unused fucntions
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [LTP] [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 6/6] crypto/af_alg05: new regression test for skcipher_walk error bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/6] lib: add tst_af_alg lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/6] crypto/af_alg04: new regression test for vmac race conditions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/6] crypto/af_alg02: new regression test for salsa20 empty message bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/6] crypto/af_alg01: new regression test for hmac nesting bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Gael PORTAY <gael.portay@xxxxxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - reduce kernel stack usage with clang
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: "Ezequiel Garcia" <ezequiel.garcia@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]