Linux Crypto
[Prev Page][Next Page]
- Re: crypto: xts - Fix atomic sleep when walking skcipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- crypto: lrw - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: xts - Fix atomic sleep when walking skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- BUG: sleeping function called from invalid context at crypto/skcipher.c:LINE
- From: syzbot <syzbot+6f72c20560060c98b566@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: powerpc - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cavium - remove bogus code handling cryptd
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cryptd - remove ability to instantiate ablkciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] crypto: scompress - initialize per-CPU variables on each CPU
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- [PATCH] crypto: rockchip - update IV buffer to contain the next IV
- From: Zhang Zhijie <zhangzj@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFC PATCH] chtls_rsk_opsv6 can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 7/7] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: testmgr - fuzz AEADs against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: testmgr - identify test vectors by name rather than number
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: testmgr - fuzz hashes against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: testmgr - expand ability to test for errors
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: testmgr - add helpers for fuzzing against generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: testmgr - fuzz skciphers against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 3/4] crypto/chelsio/chtls: CPL for TLS client
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] crypto/chelsio/chtls: chtls_sock_release() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [crypto 2/4] crypto/chelsio/chtls: hardware connect API
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto 4/4] IPv6 changes for Inline TLS
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [crypto 4/4] IPv6 changes for Inline TLS
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 1/4] net/tls: connect routine for Inine TLS Client
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- [PATCH v9 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH 22/24] crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Benjamin Tissoires <benjamin.tissoires@xxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 22/24] crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/24] crypto: stm32 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/24] crypto: rockchip - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/24] crypto: qce - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/24] crypto: picoxcell - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/24] crypto: omap - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/24] crypto: n2 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/24] crypto: talitos - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/24] crypto: marvell - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/24] crypto: ux500 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/24] crypto: nitrox - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/24] crypto: ixp4xx - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/24] crypto: inside-secure - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/24] crypto: hifn_795x - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/24] crypto: hisilicon - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/24] crypto: ccree - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/24] crypto: ccp - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/24] crypto: cavium - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/24] crypto: caam - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/24] crypto: bcm - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/24] crypto: s390 - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/24] crypto: atmel - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/24] crypto: sparc - Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/24] crypto: des_generic - Forbid 2-key in 3DES and add helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/24] Forbid 2-key 3DES in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Rik van Riel <riel@xxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/7] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 2/7] crypto: salsa20 - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 4/7] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- Re: [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: arm64/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: salsa20 - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: arm/aes-neonbs - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: vmx - return correct error code on failed setkey
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: fixes in preparation of new fuzz tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: lrw - don't access already-freed walk.iv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: remove set but not used variable 'fini'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [crypto 0/4] Inline TLS client and v6 support
- From: Jakub Kicinski <jakub.kicinski@xxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: Convert IS_ENABLED uses to __is_defined
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [crypto 4/4] IPv6 changes for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 3/4] crypto/chelsio/chtls: CPL for TLS client
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 2/4] crypto/chelsio/chtls: hardware connect API
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 1/4] net/tls: connect routine for Inine TLS Client
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 0/4] Inline TLS client and v6 support
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: ccp: Do not free psp_master when PLATFORM_INIT fails
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: stm32/hash - Fix self test issue during export
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 00/18] crypto: fuzz algorithms against their generic implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add panic_on_fail module parameter
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: scompress: return proper error code for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: introduce SEV_GET_ID2 command
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4 03/17] fscrypt: use FSCRYPT_* definitions, not FS_*
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 06/17] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 08/17] fscrypt: add FS_IOC_REMOVE_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 05/17] fscrypt: refactor v1 policy key setup into keysetup_legacy.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 10/17] fscrypt: add an HKDF-SHA512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 02/17] fscrypt: use FSCRYPT_ prefix for uapi constants
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/17] fs, fscrypt: move uapi definitions to new header <linux/fscrypt.h>
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 09/17] fscrypt: add FS_IOC_GET_ENCRYPTION_KEY_STATUS ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 14/17] ext4: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 16/17] ubifs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 11/17] fscrypt: v2 encryption policy support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 17/17] fscrypt: document the new ioctls and policy version
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 13/17] fscrypt: require that key be added when setting a v2 encryption policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 12/17] fscrypt: allow unprivileged users to add/remove keys for v2 policies
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 15/17] f2fs: wire up new fscrypt ioctls
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 07/17] fs/dcache.c: add shrink_dcache_inode()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/17] fscrypt: add ->ci_inode to fscrypt_info
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 00/17] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 08/18] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] padata: Replace padata_attr_type default_attrs field with groups
- From: Kimberly Brown <kimbrownkd@xxxxxxxxx>
- [PATCH v2 0/8] kobject: Add default group support to kobj_type and replace subsystem uses
- From: Kimberly Brown <kimbrownkd@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 07/18] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH 1/1] crypto: testmgr - call shash_init in crc32c algo
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- crypto: mxc-scc - Remove broken driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: Should we consider removing Streebog from the Linux Kernel?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- [PATCH v3] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Block layer does not call add_disk_randomness any more
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Horia Geanta <horia.geanta@xxxxxxx>
- RE: Should we consider removing Streebog from the Linux Kernel?
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: stm32 - set default random quality
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/2] hwrng: stm32 - Fix issue and add default quality level
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/2] hwrng: stm32 - fix unbalanced pm_runtime_enable
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 06/18] crypto: chacha20poly1305 - set cra_name correctly
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [RFC/RFT PATCH 01/18] crypto: x86/poly1305 - fix overflow during partial reduction
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] crypto: testmgr - add panic_on_fail module parameter
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 06/18] crypto: chacha20poly1305 - set cra_name correctly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 11/18] crypto: arm64/cbcmac - handle empty messages in same way as template
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 17/18] crypto: testmgr - fuzz AEADs against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 09/18] crypto: streebog - fix unaligned memory accesses
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 08/18] crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 18/18] crypto: run initcalls for generic implementations earlier
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 10/18] crypto: cts - don't support empty messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 12/18] crypto: testmgr - expand ability to test for errors
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 14/18] crypto: testmgr - add helpers for fuzzing against generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 13/18] crypto: testmgr - identify test vectors by name rather than number
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 16/18] crypto: testmgr - fuzz skciphers against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 15/18] crypto: testmgr - fuzz hashes against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 07/18] crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 01/18] crypto: x86/poly1305 - fix overflow during partial reduction
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 04/18] crypto: skcipher - restore default skcipher_walk::iv on error
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 05/18] crypto: skcipher - don't WARN on unprocessed data after slow walk step
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 02/18] crypto: crct10dif-generic - fix use via crypto_shash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 00/18] crypto: fuzz algorithms against their generic implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC/RFT PATCH 03/18] crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] KEYS: asym_tpm: move setting set_pub_key parameters into derive_pub_key
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 4/6] dt-bindings: firmware: Document cznic,turris-mox-rwtm binding
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 1/6] dt-bindings: mailbox: Document armada-3700-rwtm-mailbox binding
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 2/6] mailbox: Add support for Armada 37xx rWTM mailbox
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 6/6] firmware: turris-mox-rwtm: Add sysfs documentation
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 0/6] Armada 37xx mailbox + Turris
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 5/6] firmware: Add Turris Mox rWTM firmware driver
- From: Marek Behún <marek.behun@xxxxxx>
- [PATCH v3 crypto+mailbox+firmware RESEND 3/6] arm64: dts: marvell: armada-37xx: add mailbox node
- From: Marek Behún <marek.behun@xxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -next] crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: marvell - remove set but not used variable 'index'
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 35/57] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 36/57] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 20/37] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 21/37] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 12/21] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 13/21] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH -next] crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 10/16] crypto: sha512/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 09/16] crypto: sha256/arm - fix crash bug in Thumb2 build
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] crypto: Use ___cacheline_aligned for aes data
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- [PATCH] hwrng: core - don't block in add_early_randomness()
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- [PATCH 2/2] crypto: scompress: Use per-CPU struct instead multiple variables
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: scompress: return proper error code for allocation failure
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH v2] crypto: ccp: introduce SEV_GET_ID2 command
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: KASAN: use-after-free Read in generic_gcmaes_encrypt
- From: syzbot <syzbot+6d3612ba5e254e387153@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH -next] crypto: vmx - Make p8_init and p8_exit static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - Make cptvf_device_init static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: brcm - remove unused array tag_to_hash_idx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: zip - Make some functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - Make some functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: cavium - remove unused fucntions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: chtls - handle inet_csk_reqsk_queue_add() failures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] X.509: Add messages for obsolete OIDs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.0 067/262] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 068/262] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 216/262] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 050/192] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 049/192] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 160/192] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 034/123] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 035/123] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 101/123] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 25/87] crypto: crypto4xx - add missing of_node_put after of_device_is_available
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 70/87] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 52/63] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 3.18 33/41] hwrng: virtio - Avoid repeated init of completion
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Riku Voipio <riku.voipio@xxxxxx>
- Bad file pattern in MAINTAINERS section 'IBM Power in-Nest Crypto Acceleration'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Zhang Zhijie <zhangzj@xxxxxxxxxxxxxx>
- Re: Should we consider removing Streebog from the Linux Kernel?
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Should we consider removing Streebog from the Linux Kernel?
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: David Miller <davem@xxxxxxxxxxxxx>
- [RFC v7.1] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: INFO: task hung in tls_sw_free_resources_tx
- From: syzbot <syzbot+503339bf3c9053b8a7fc@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - limit AXI pipeline to a depth of 1
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH net-next v9 01/19] asm: simd context helper API
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: Kconfig - fix typos AEGSI -> AEGIS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: salsa20-generic - use crypto_xor_cpy()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha-generic - use crypto_xor_cpy()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - reduce kernel stack usage with clang
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: omap - Set default quality
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: test the !may_use_simd() fallback code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: add SIMD helpers for AEADs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix copy of next buffer for xcbc and cmac
- From: Iuliana Prodan <iuliana.prodan@xxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH net-next v9 07/19] zinc: Poly1305 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 06/19] zinc: ChaCha20 MIPS32r2 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 04/19] zinc: ChaCha20 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 03/19] zinc: ChaCha20 generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 02/19] zinc: introduce minimal cryptography library
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 01/19] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 08/19] zinc: Poly1305 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 10/19] zinc: Poly1305 MIPS64 and MIPS32r2 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 09/19] zinc: Poly1305 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 13/19] zinc: BLAKE2s x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 11/19] zinc: ChaCha20Poly1305 construction and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 15/19] zinc: Curve25519 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 14/19] zinc: Curve25519 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 17/19] zinc: Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 18/19] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 19/19] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 16/19] zinc: import Bernstein and Schwabe's Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH 0/17] Add zinc using existing algorithm implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 8/17] zinc: Add generic C implementation of poly1305 and self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/17] zinc: BLAKE2s x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/17] zinc: Add x86 accelerated poly1305
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/17] zinc: ChaCha20Poly1305 construction and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/17] zinc: import Bernstein and Schwabe's Curve25519 ARM implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/17] zinc: Curve25519 ARM implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/17] zinc: BLAKE2s generic C implementation and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/17] security/keys: rewrite big_key crypto to use Zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/17] zinc: Curve25519 x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/17] zinc: Curve25519 generic C implementations and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/17] zinc: Add x86 accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/17] crypto: poly1305 - Export core functions without crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/17] zinc: Add generic C implementation of chacha20 and self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/17] zinc: Add arm accelerated chacha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/17] crypto: chacha20 - Export chacha20 functions without crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/17] asm: simd context helper API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/17] zinc: introduce minimal cryptography library
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/17] Add zinc using existing algorithm implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] X.509: Add messages for obsolete OIDs
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH v3 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 2/3] crypto: caam/jr - Removed redundant vars from job ring private data
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 0/3] CAAM job ring driver cleanups
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC PATCH] crypto: chtls - handle inet_csk_reqsk_queue_add() failures
- From: Guillaume Nault <gnault@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Gael PORTAY <gael.portay@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: caam/jr - Removed redundant vars from job ring private data
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH -next] crypto: vmx - Make p8_init and p8_exit static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [Bug] STM32 crc driver failed on selftest 1
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Bug] STM32 crc driver failed on selftest 1
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- Re: KASAN: use-after-free Read in crypto_gcm_init_common
- From: syzbot <syzbot+e736399a2c4054612307@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14] crypto: arm64/aes-neonbs - fix returning final keystream block
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14] crypto: arm64/aes-neonbs - fix returning final keystream block
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 1/3] arm64: dts: exynos: add SlimSSS for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Mukesh Ojha <mojha@xxxxxxxxxxxxxx>
- [PATCH trivial] crypto: Grammar s/options/option/, s/to/the/
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Gary R Hook <ghook@xxxxxxx>
- Re: crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - Make cptvf_device_init static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: brcm - remove unused array tag_to_hash_idx
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: zip - Make some functions static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: ccp - Make ccp_register_rsa_alg static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - Make some functions static
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: cavium - remove unused fucntions
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- crypto: Kernel memory overwrite attempt detected to spans multiple pages
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [LTP] [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 6/6] crypto/af_alg05: new regression test for skcipher_walk error bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/6] lib: add tst_af_alg lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/6] crypto/af_alg04: new regression test for vmac race conditions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/6] crypto/af_alg02: new regression test for salsa20 empty message bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/6] crypto/af_alg01: new regression test for hmac nesting bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Gael PORTAY <gael.portay@xxxxxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - reduce kernel stack usage with clang
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: "Ezequiel Garcia" <ezequiel.garcia@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [LTP] [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v2 2/3] crypto: caam/jr - Removed redundant vars from job ring private data
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v2 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v2 0/3] CAAM job ring driver cleanups
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [LTP] [PATCH 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 2/6] crypto/af_alg01: new regression test for hmac nesting bug
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 1/6] lib: add tst_af_alg lib
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Chris Spencer <spencercw@xxxxxxxxx>
- [PATCH] crypto: Kconfig - fix typos AEGSI -> AEGIS
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: add SIMD helpers for AEADs
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH] crypto: salsa20-generic - use crypto_xor_cpy()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: chacha-generic - use crypto_xor_cpy()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH 2/3] crypto: caam/jr - Remove redundant vars from job ring private data
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH 1/3] crypto: caam/jr - Remove spinlock for output job ring
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH 0/3] CAAM job ring driver cleanups
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [Bug] Rockchip crypto driver sometimes produces wrong ciphertext
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: vmx - fix copy-paste error in CTR mode
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: BUG: p8_aes_ctr randomly returns wrong results
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v3 mailbox+firmware 5/6] firmware: turris-mox-rwtm: Add sysfs documentation
- From: Marek Behún <marek.behun@xxxxxx> (by way of Marek Behun <marek.behun@xxxxxx>)
- [PATCH v3 mailbox+firmware 4/6] firmware: Add Turris Mox rWTM firmware driver
- From: Marek Behún <marek.behun@xxxxxx> (by way of Marek Behun <marek.behun@xxxxxx>)
- Re: [PATCH 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: ccree - reduce kernel stack usage with clang
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: BUG: p8_aes_ctr randomly returns wrong results
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: BUG: p8_aes_ctr randomly returns wrong results
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- BUG: p8_aes_ctr randomly returns wrong results
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 0/8] crypto: test the !may_use_simd() fallback code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 8/8] crypto: testmgr - test the !may_use_simd() fallback code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 7/8] crypto: simd - convert to use crypto_simd_usable()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 6/8] crypto: arm64 - convert to use crypto_simd_usable()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/8] crypto: arm - convert to use crypto_simd_usable()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/8] crypto: x86 - convert to use crypto_simd_usable()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/8] crypto: simd,testmgr - introduce crypto_simd_usable()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/8] crypto: arm64/gcm-aes-ce - fix no-NEON fallback code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/8] crypto: chacha-generic - fix use as arm64 no-NEON fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/8] crypto: arm64 - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/8] crypto: testmgr - test the !may_use_simd() fallback code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/8] crypto: arm - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 7/8] crypto: simd - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/8] crypto: x86 - convert to use crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/8] crypto: test the !may_use_simd() fallback code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/8] crypto: chacha-generic - fix use as arm64 no-NEON fallback
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/8] crypto: simd,testmgr - introduce crypto_simd_usable()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/8] crypto: arm64/gcm-aes-ce - fix no-NEON fallback code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Announce loop-AES-v3.7n file/swap crypto package
- From: Jari Ruusu <jari.ruusu@xxxxxxxxx>
- [GIT] Crypto Fixes for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- mainline/master boot bisection: v5.0-10530-g6bc3fe8e7e17 on peach-pi
- From: "kernelci.org bot" <bot@xxxxxxxxxxxx>
- [PATCH] hwrng: omap - Set default quality
- From: Rouven Czerwinski <r.czerwinski@xxxxxxxxxxxxxx>
- [PATCH 7/9] crypto: x86/morus640 - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/9] crypto: x86/morus1280 - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/9] crypto: x86/aegis256 - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/9] crypto: x86/aegis128l - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 9/9] crypto: testmgr - remove workaround for AEADs that modify aead_request
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/9] crypto: x86/aegis128 - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/9] crypto: x86/aesni - convert to use skcipher SIMD bulk registration
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/9] crypto: x86/aesni - convert to use AEAD SIMD helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/9] crypto: simd - support wrapping AEAD algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/9] crypto: add SIMD helpers for AEADs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- [possible PATCH] crypto: sahara - Use #ifdef DEBUG not IS_ENABLED(DEBUG)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH RESEND v3] crypto: caam - add missing put_device() call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss - fix AES support for Exynos5433
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: mainline/master boot bisection: v5.0-4854-g8dcd175bc3d5 on odroid-xu3
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- mainline/master boot bisection: v5.0-5022-g542d0e583b7b on odroid-xu3
- From: "kernelci.org bot" <bot@xxxxxxxxxxxx>
- mainline/master boot bisection: v5.0-4854-g8dcd175bc3d5 on odroid-xu3
- From: "kernelci.org bot" <bot@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v3] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [GIT] Crypto Update for 5.1
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Chris Spencer <spencercw@xxxxxxxxx>
- [GIT] Crypto Update for 5.1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [GIT] Crypto Fixes for 5.0
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT] Crypto Fixes for 5.0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT] Crypto Fixes for 5.0
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH RESEND v3] crypto: caam - add missing put_device() call
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss - fix AES support for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] crypto: s5p-sss - fix AES support for Exynos5433
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 08/12] crypto: add missing of_node_put after of_device_is_available
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/chacha - fix for big endian
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] add AES support for Exynos5433
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - use struct_size() in sock_kfree_s()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - remove redundant likely/unlikely annotation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: s5p: update iv after AES-CBC op end
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/poly1305 - Clear key material from stack in SSE2 variant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/jr - DMA API fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835 - fix probe as platform device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss - Use AES_BLOCK_SIZE define instead of number
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32 - drop pointless static qualifier in stm32_hash_remove()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/chelsio/chcr: Fixed Traffic Stall
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: marvell - Remove set but not used variable 'ivsize'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT] Crypto Fixes for 5.0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: SEV Command Privilege Separation
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Jan Glauber <jglauber@xxxxxxxxxxx>
- Re: general protection fault in gcmaes_crypt_by_sg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: introduce SEV_GET_ID2 command
- From: "Singh, Brijesh" <brijesh.singh@xxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC 0/4] crypto: caam - Add i.MX8MQ support
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [RFC 0/4] crypto: caam - Add i.MX8MQ support
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC 0/4] crypto: caam - Add i.MX8MQ support
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v7 07/28] x86/asm/crypto: annotate local functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 1/4] crypto: caam - fix detection of i.MX8 SoC
- From: Chris Spencer <spencercw@xxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 00/12] add missing of_node_put after of_device_is_available
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 08/12] crypto: add missing of_node_put after of_device_is_available
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [PATCH 2/2] crypto: arm64/chacha - fix hchacha_block_neon() for big endian
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm64/chacha - fix chacha_4block_xor_neon() for big endian
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: cavium/zip - fix collision with generic cra_driver_name
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: arm64/chacha - fix chacha_4block_xor_neon() for big endian
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: arm64/chacha - fix hchacha_block_neon() for big endian
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: arm64/chacha - fix for big endian
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 0/3] add AES support for Exynos5433
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/3] dt-bindings: crypto: document Exynos5433 SlimSSS
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] crypto: s5p: add AES support for Exynos5433
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] arm64: dts: exynos: add SlimSSS for Exynos5433
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] SHA fixes for 32-bit ARM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Update driver messages to remove some confusion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: adiantum - add 1536 and 4096-byte test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nhpoly1305 - add a test vector with len % 16 != 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: test that CBC and CTR update the IV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: rockchip - fix scatterlist nents error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree - fix missing break in switch statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam/qi2 - performance-related updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: chtls: remove cdev_list_lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: add missing inline qualifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - remove redundant likely/unlikely annotation
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [RFC 4/4] crypto: caam - use job ring for RNG instantiation instead of DECO
- From: spencercw@xxxxxxxxx
- [RFC 3/4] crypto: caam - correct DMA address size for the i.MX8
- From: spencercw@xxxxxxxxx
- [RFC 2/4] crypto: caam - do not initialise clocks on the i.MX8
- From: spencercw@xxxxxxxxx
- [RFC 1/4] crypto: caam - fix detection of i.MX8 SoC
- From: spencercw@xxxxxxxxx
- [RFC 0/4] crypto: caam - Add i.MX8MQ support
- From: spencercw@xxxxxxxxx
- Re: [PATCH] crypto: ccp: introduce SEV_GET_ID2 command
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: af_alg - use struct_size() in sock_kfree_s()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/6] crypto/af_alg04: new regression test for vmac race conditions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/6] lib: add tst_af_alg lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/6] crypto/af_alg03: new regression test for rfc7539 hash alg validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/6] crypto/af_alg05: new regression test for skcipher_walk error bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/6] crypto/af_alg01: new regression test for hmac nesting bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/6] crypto/af_alg02: new regression test for salsa20 empty message bug
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/6] ltp: AF_ALG test helpers and a few regression tests
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol 'optee_rng_id_table' static
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC PATCH v3 07/18] fscrypt: add FS_IOC_ADD_ENCRYPTION_KEY ioctl
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [RFC PATCH v3 04/18] fs: add ->s_master_keys to struct super_block
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol 'optee_rng_id_table' static
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [RFC PATCH v3 00/18] fscrypt: key management improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree - fix missing break in switch statement
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/18] fscrypt: key management improvements
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol 'optee_rng_id_table' static
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol 'optee_rng_id_table' static
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]