Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xxhash - Implement xxhash support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/14] crypto: inside-secure - unify cache reset
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/14] crypto: inside-secure - remove useless check
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/14] crypto: inside-secure - move comment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 13/14] crypto: inside-secure - fix use of the SG list
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 14/14] crypto: inside-secure - do not rely on the hardware last bit for result descriptors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/14] crypto: inside-secure - add support for HMAC updates
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/14] crypto: inside-secure - implement IV retrieval
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/14] crypto: inside-secure - fix zeroing of the request in ahash_exit_inv
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/14] crypto: inside-secure - fix queued len computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/14] crypto: inside-secure - self-test fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/14] crypto: inside-secure - enable context reuse
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/14] crypto: inside-secure - change returned error when a descriptor reports an error
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/14] crypto: inside-secure - improve the result error format when displayed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/14] crypto: inside-secure - fix coding style for a condition
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/14] crypto: inside-secure - remove empty line
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xxhash - Implement xxhash support
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] hwrng: add mtk-sec-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 0/3] MediaTek Security random number generator support
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: rng: update bindings for MediaTek ARMv8 SoCs
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- inside secure driver update
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- [PATCH v2 6/6] dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: atmel-ecc: factor out code that can be shared
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] crypto - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v3 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: another testmgr question
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: another testmgr question
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: another testmgr question
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: another testmgr question
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: another testmgr question
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: another testmgr question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] crypto: caam: print messages in caam_dump_sg at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: caam: print IV only when non NULL
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: CAAM: Print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: caam: remove unused defines
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 1/2] crypto: crypto4xx - fix blocksize for cfb and ofb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - print debugging hex dumps after unmapping
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - AES CFB mode is a stream cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] arm/sha512 - Make sha512_arm_final static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: caam - IOMMU support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ixp4xx - Fix cross-compile errors due to type mismatch
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/sha512 - make function static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 082/317] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 065/244] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: hmac - fix memory leak in hmac_init_tfm()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 042/167] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 027/114] crypto: sun4i-ss - Fix invalid calculation of hash end
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: arm/sha512 - make function static
- From: Philippe Mazenauer <philippe.mazenauer@xxxxxxxxxx>
- Re: [PATCH] crypto: jitterentropy - change back to module_init()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: jitterentropy - change back to module_init()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: crypto: run initcalls for generic implementations earlier
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Extra selftests failure on Talitos SEC1 hash algs - how can I identify the issue ?
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 3/3] crypto: caam: print messages in caam_dump_sg at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 1/3] crypto: caam: remove unused defines
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 08/15] crypto: talitos - Do not modify req->cryptlen on decryption.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 11/15] crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 09/15] crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 12/15] crypto: talitos - fix AEAD processing.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 13/15] Revert "crypto: talitos - export the talitos_submit function"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 14/15] crypto: talitos - use IS_ENABLED() in has_ftr_sec1()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 15/15] crypto: talitos - use SPDX-License-Identifier
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 06/15] crypto: talitos - check data blocksize in ablkcipher.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 07/15] crypto: talitos - fix ECB algs ivsize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 04/15] crypto: talitos - check AES key size
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 03/15] crypto: talitos - reduce max key size for SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 01/15] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 10/15] crypto: talitos - properly handle split ICV.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 05/15] crypto: talitos - fix CTR alg blocksize
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos.
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v1 00/15] Fixing selftests failure on Talitos driver
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Kozina <okozina@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - implement keyring support
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH] crypto: af_alg - implement keyring support
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to skcipher API
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 00/16] fscrypt: key management improvements
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v7 01/12] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v7 00/12] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v6 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: algapi - remove crypto_tfm_in_queue()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: hash - remove CRYPTO_ALG_TYPE_DIGEST
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cryptd - move kcrypto_wq into cryptd
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: gf128mul - make unselectable by user
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: echainiv - change to 'default n'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: make all templates select CRYPTO_MANAGER
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - make extra tests depend on cryptomgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - fix length truncation with large page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - convert to SPDX license identifiers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] char: hw_random: meson-rng: update with SPDX Licence identifier
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [STABLE PATCH 0/2] crypto: ccree: fixes backport to 4.19
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 2/2] crypto: ccree: fix backlog notifications
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 1/2] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [STABLE PATCH 0/2] crypto: ccree: fixes backport to 4.19
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: skcipher - perform len fits into blocksize check at the top
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH] crypto: skcipher - perform len fits into blocksize check at the top
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 2/2] crypto: crypto4xx - block ciphers should only accept complete blocks
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 1/2] crypto: crypto4xx - fix blocksize for cfb and ofb
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 4.4,4.9] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 4.4,4.9,4.14] crypto: salsa20 - don't access already-freed walk.iv
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.4] crypto: chacha20poly1305 - set cra_name correctly
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 4.4 2/2] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: crypto4xx - fix AES CTR blocksize value
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 4.4 2/2] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4 1/2] crypto: gcm - Fix error return code in crypto_gcm_create_common()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4] crypto: chacha20poly1305 - set cra_name correctly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4,4.9] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.14] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4.4,4.9,4.14] crypto: salsa20 - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caam: print messages in caam_dump_sg at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: CAAM: Print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: caam: remove unused defines
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: caam: print debug messages at debug level
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: vmx - ghash: do nosimd fallback manually
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [GIT] Crypto Fixes for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Can scatterlist elements cross page boundary ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: ctr(aes) broken in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: caam: print debugging hex dumps after unmapping
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- ctr(aes) broken in CAAM driver
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Can crypto API provide information about hw acceleration?
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: talitos - fix skcipher failure due to wrong output IV
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- RE: Can scatterlist elements cross page boundary ?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Can scatterlist elements cross page boundary ?
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v2 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH v2 2/2] crypto: caam - strip input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH] crypto: vmx - CTR: always increment IV as quadword
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - fix pkcs1pad input without changing crypto request
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [GIT] Crypto Fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: hash - fix incorrect HASH_MAX_DESCSIZE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel stack is corrupted in: generate_random_hash_testvec
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - Fix 3DES complaint from ccp-crypto module
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 2/3] crypto: ccp - fix AES CFB error exposed by new test vectors
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- [PATCH 1/3] crypto: ccp - AES CFB mode is a stream cipher
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: Can crypto API provide information about hw acceleration?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH] crypto: caam - fix typo in i.MX6 devices list for errata
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 1/2] crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- [PATCH 2/2] crypto: caam - fix pkcs1pad input without changing crypto request
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Can crypto API provide information about hw acceleration?
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- crypto: Kernel stack is corrupted in: generate_random_hash_testvec
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next] arm/sha512 - Make sha512_arm_final static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Ray Jui <ray.jui@xxxxxxxxxxxx>
- Re: [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 2/2] hwrng: iproc-rng200: Add support for 7211
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: rng: Document BCM7211 RNG compatible string
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 0/2] hwrng: Support for 7211 in iproc-rng200
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/2] zstd: pass pointer rathen than structure to functions
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 2/2] zstd: use U16 data type for rankPos
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: potential underfow in crypto/lrw.c setkey() setkey
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug 203559] New: usercopy_abort triggered by build_test_sglist
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Bug 203559] New: usercopy_abort triggered by build_test_sglist
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 4/5] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: atmel-ecc: factor out code that can be shared
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- potential underfow in crypto/lrw.c setkey() setkey
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto:chelsio Fix NULL pointer dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Neal Liu <neal.liu@xxxxxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] hwrng: add mt67xx-rng driver
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 2/3] dt-bindings: rng: update bindings for MT67xx SoCs
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 1/3] soc: mediatek: add SMC fid table for SIP interface
- From: <neal.liu@xxxxxxxxxxxx>
- [PATCH 0/3] MT67XX random number generator support
- From: <neal.liu@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/7] crypto: x86/glue_helper: Add static inline function glue macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/7] crypto: x86/camellia: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/7] crypto: x86/crypto: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 7/7] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/7] crypto: x86/twofish: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: x86/aesni: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/7] crypto: x86/cast6: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam: fix caam_dump_sg that iterates through scatterlist
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH v5] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 64/95] crypto: testmgr - add AES-CFB tests
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [GIT] Crypto Update for 5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [v2 PATCH] crypto: caam - fix DKP detection logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Fwd: [Bug 203515] [crypto] alg: skcipher: p8_aes_ctr encryption test failed (wrong result) on test vector 3, cfg="uneven misaligned splits, may sleep"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Fwd: [Bug 203515] New: [crypto] alg: skcipher: p8_aes_ctr encryption test failed (wrong result) on test vector 3, cfg="uneven misaligned splits, may sleep"
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [GIT] Crypto Update for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 7/7] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 6/7] crypto: caam/qi - DMA map keys using proper device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 5/7] crypto: caam/qi - fix address translations with IOMMU enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 2/7] crypto: caam - fix S/G table passing page boundary
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 4/7] crypto: caam/qi - don't allocate an extra platform device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 1/7] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 0/7] crypto: caam - IOMMU support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: use a proper le32 type for le32 val
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH next 02/25] crypto: picoxcell: Use dev_get_drvdata()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: stm32/cryp - add weak key check for DES
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix DKP detection logic
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- RE: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: DRBG - add FIPS 140-2 CTRNG for noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 4/4] MAINTAINERS: Maintainer for Chelsio crypto driver
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 3/4] crypto:chelsio count incomplete block in IV
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 2/4] crypto:chelsio Fix softlockup with heavy I/O
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/4] crypto:chelsio Fix NULL pointer dereference
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH V3 1/4] dt-bindings: crypto: Add bindings for ZynqMP SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 4/4] ARM64: zynqmp: Add Xilinix SHA-384 node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 3/4] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V3 2/4] firmware: xilinx: Add ZynqMP sha_hash API for SHA3 functionality
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- Re: [PATCH 1/5] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] X.509: Add messages for obsolete OIDs
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- RE: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 5/5] dt-bindings: add Atmel SHA204A I2C crypto processor
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] crypto: atmel-i2c: add support for SHA204A random number generator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] crypto: atmel-ecc: factor out code that can be shared
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: atmel-ecc: add support for ACPI probing on non-AT91 platforms
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] i2c: acpi: permit bus speed to be discovered after enumeration
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] synquacer - wire up Atmel SHA204A as RNG in DT and ACPI mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- RE: crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: crypto: inside_secure - call for volunteers
- From: "antoine.tenart@xxxxxxxxxxx" <antoine.tenart@xxxxxxxxxxx>
- crypto: inside_secure - call for volunteers
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: crypto: akcipher: userspace API?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: akcipher: userspace API?
- From: Marek Behun <marek.behun@xxxxxx>
- [PATCH 7/7] crypto: qat - do not offload zero length requests
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 6/7] crypto: qat - return error for block ciphers for invalid requests
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 5/7] crypto: qat - return proper error code in setkey
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 4/7] crypto: qat - fix block size for aes ctr mode
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 3/7] crypto: qat - update iv after encryption or decryption operations
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 2/7] crypto: qat - add check for negative offset in alg precompute function
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: ccree: use a proper le32 type for le32 val
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: cc_sec_disable can be static
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: [PATCH 0/7] crypto: caam - IOMMU support
- From: Laurentiu Tudor <laurentiu.tudor@xxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: ccree - Make cc_sec_disable static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: ccree - remove set but not used variable 'du_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: ccree: fix spelling mistake "protedcted" -> "protected"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RE: [PATCH 0/7] crypto: caam - IOMMU support
- From: Franck Lenormand <franck.lenormand@xxxxxxx>
- [cryptodev:master 136/163] drivers/crypto/ccree/cc_driver.c:112:16: sparse: sparse: cast to restricted __le32
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH cryptodev] crypto: cc_sec_disable can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [cryptodev:master 130/163] drivers/crypto/ccree/cc_driver.c:38:6: sparse: sparse: symbol 'cc_sec_disable' was not declared. Should it be static?
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: caam - defer probing until QMan is available
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/7] crypto: caam - convert top level drivers to libraries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 6/7] crypto: caam/qi - DMA map keys using proper device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 5/7] crypto: caam/qi - fix address translations with IOMMU enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/7] crypto: caam - fix S/G table passing page boundary
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 4/7] crypto: caam/qi - don't allocate an extra platform device
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/7] crypto: caam - avoid S/G table fetching for AEAD zero-length output
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/7] crypto: caam - IOMMU support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 2/3] crypto: caam/qi2 - fix DMA mapping of stack memory
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/3] crypto: caam/qi2 - generate hash keys in-place
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam/qi2 - fix zero-length buffer DMA mapping
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/3] crypto: caam/qi2 - ahash fixes for 5.2
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: sun4i-ss: Fix problem reported by CONFIG_CRYPTO_EXTRA_TESTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Fix HW family part name format
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - update gcm detection logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] crypto: remove shash_desc::flags
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/3] crypto: stm32/cryp - update to return iv_out
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/3] crypto: stm32/cryp - add weak key check for DES
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] crypto: stm32/cryp - remove request mutex protection
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: <Nicolas.Ferre@xxxxxxxxxxxxx>
- [PATCH -next] crypto: atmel - remove set but not used variable 'alg_name'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH v2] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_gcm_init_common
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 23 (crypto/ecrdsa)
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: linux-next: Tree for Apr 23 (crypto/ecrdsa)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH next 02/25] crypto: picoxcell: Use dev_get_drvdata()
- From: Kefeng Wang <wangkefeng.wang@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto4xx: fix cfb and ofb "overran dst buffer" issues
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: Crypto API AEAD question
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto API AEAD question
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto4xx: fix cfb and ofb "overran dst buffer" issues
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 3/4] crypto4xx: use sync skcipher for fallback
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 4/4] crypto4xx: get rid of redundant using_sd variable
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 1/4] crypto4xx: fix ctr-aes missing output IV
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- RE: [RFC PATCH 4/5] crypto: Adds user space interface for ALG_SET_KEY_TYPE
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- RE: [RFC PATCH V2 3/4] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v5 03/16] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 02/16] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 04/16] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 05/16] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 09/16] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 08/16] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 12/16] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 13/16] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 15/16] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 11/16] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 10/16] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 07/16] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 16/16] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 14/16] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 06/16] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 01/16] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 00/16] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: stm32/hash - Fix self test issue during export
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: powerpc - convert to use crypto_simd_usable()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: shash - fix missed optimization in shash_ahash_digest()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium - remove bogus code handling cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd - remove ability to instantiate ablkciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rockchip - update IV buffer to contain the next IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: remove set but not used variable 'fini'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: sahara: Convert IS_ENABLED uses to __is_defined
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Do not free psp_master when PLATFORM_INIT fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/35] crypto: ccree: add support for sec disabled mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/35] crypto: ccree: fix backlog notifications
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/35] crypto: ccree: add CID and PID support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 35/35] crypto: ccree: handle tee fips error during power management resume
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 34/35] crypto: ccree: add function to handle cryptocell tee fips error
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 27/35] crypto: ccree: use correct internal state sizes for export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 26/35] crypto: ccree: zap entire sg on aead request unmap
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/35] crypto: ccree: fix typo in debugfs error path
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 33/35] crypto: ccree: HOST_POWER_DOWN_EN should be the last CC access during suspend
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 32/35] crypto: ccree: remove cc7x3 obsoleted AXIM configs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 31/35] crypto: ccree: pm resume first enable the source clk
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 30/35] crypto: ccree: don't map AEAD key and IV on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 29/35] crypto: ccree: don't map MAC key on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 28/35] crypto: ccree: allow more AEAD assoc data fragments
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 25/35] crypto: ccree: make AEAD sgl iterator well behaved
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 22/35] crypto: ccree: simplify fragment ICV detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/35] crypto: ccree: remove special handling of chained sg
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 24/35] crypto: ccree: don't mangle the request assoclen
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 23/35] crypto: ccree: simplify AEAD ICV addr calculation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 21/35] crypto: ccree: remove unused defines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 18/35] crypto: ccree: copyright header update
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 20/35] crypto: ccree: do not copy zero size MLLI table
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 19/35] crypto: ccree: zero out internal struct before use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 17/35] crypto: ccree: use std api when possible
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 16/35] crypto: ccree: use devm_kzalloc for device data
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 15/35] crypto: ccree: fix mem leak on error path
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/35] crypto: ccree: use proper callback completion api
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/35] crypto: ccree: read next IV from HW
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/35] crypto: ccree: adapt CPP descriptor to new HW
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/35] crypto: ccree: add SM4 protected keys support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/35] crypto: ccree: add remaining logic for CPP
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/35] crypto: ccree: add CPP completion handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/35] crypto: ccree: move MLLI desc. before key load
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/35] crypto: ccree: move key load desc. before flow desc.
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/35] crypto: testmgr: add missing self test entries for protected keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: sun4i-ss: Fix invalid calculation of hash end
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/4] crypto: sun4i-ss: fallback when length is not multiple of blocksize
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/4] crypto: sun4i-ss: remove ivsize from ECB
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/4] crypto: sun4i-ss: Handle better absence/presence of IV
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/4] crypto: sun4i-ss: Fix problem reported by CONFIG_CRYPTO_EXTRA_TESTS
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 10/12] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 07/12] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 05/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 04/12] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Question regarding crypto scatterlists / testmgr
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Question regarding crypto scatterlists / testmgr
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Fix HW family part name format
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] crypto: caam/jr - update gcm detection logic
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/26] compat_ioctl: cleanups
- From: Douglas Gilbert <dgilbert@xxxxxxxxxxxx>
- [PATCH v3 12/26] compat_ioctl: move more drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 00/26] compat_ioctl: cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: caam/jr - update gcm detection logic
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Hao Feng <fenghao@xxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH 0/6] Add Hygon SEV support
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/6] Add Hygon SEV support
- From: "Lendacky, Thomas" <Thomas.Lendacky@xxxxxxx>
- [PATCH] crypto: caam: fix spelling mistake "cannote" -> "cannot"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH 0/6] Add Hygon SEV support
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 3/6] crypto: ccp: Implement SEV_GM_PUBKEY_GEN ioctl command
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 2/6] crypto: ccp: Define Hygon SEV commands
- From: Hao Feng <fenghao@xxxxxxxx>
- [PATCH 1/6] crypto: ccp: Add Hygon Dhyana support
- From: Hao Feng <fenghao@xxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: [PATCH 0/2] hwrng: stm32 - Fix issue and add default quality level
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [v2 PATCH] crypto: xts - Fix atomic sleep when walking skcipher
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: lrw - Fix atomic sleep when walking skcipher
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: lrw - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: nx - don't abuse shash MAY_SLEEP flag
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] crypto: shash - remove shash_desc::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 2/3] crypto: nx - don't abuse shash MAY_SLEEP flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 0/3] crypto: remove shash_desc::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 1/3] crypto: shash - remove useless crypto_yield() in shash_ahash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: shash - fix missed optimization in shash_ahash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: xts - Fix atomic sleep when walking skcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]