Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - use sizeof(*priv) instead of sizeof(struct stm32_rng_private)
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - use sizeof(*priv) instead of sizeof(struct stm32_rng_private)
- From: Uwe Kleine-König <ukleinek@xxxxxxxxxx>
- Re: [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a - fix negated return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Add missing MODULE_DESCRIPTION() macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64/crypto: Raise priority of NEON crct10dif implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: X25519 supports for ppc64le
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sm2 - Remove sm2 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon/zip - optimize the address offset of the reg query function
- From: huangchenghai <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: qat - Fix typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: niagara2: Remove unused struct 'n2_skcipher_request_context'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Remove unused hifn_*_command structs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: Remove unused struct 'tdes_keys'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: acix: Remove unused struct 'dbgfs_u32'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 16/71] crypto: x86/poly1305 - Switch to new Intel CPU model defines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: hisilicon/zip - optimize the address offset of the reg query function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] hwrng: stm32 - use sizeof(*priv) instead of sizeof(struct stm32_rng_private)
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v3 1/2] hwrng: stm32 - use pm_runtime_resume_and_get()
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v3 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: acomp - Add comp_params helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: scomp - Add setparam interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: scomp - Add setparam interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: acix: Remove unused struct 'dbgfs_u32'
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- [linus:master] [crypto] e787060bdf: stress-ng.sigtrap.ops_per_sec 5.7% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: scomp - Add setparam interface
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: acomp - Add comp_params helpers
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: scomp - Add setparam interface
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH v9a 14/14] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: acomp - Add interface to set parameters
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: acomp - Add interface to set parameters
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: acomp - Add interface to set parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tcrypt - add skcipher speed for given alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 2/5] random: add vgetrandom_alloc() syscall
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 5/5] x86: vdso: Wire up getrandom() vDSO implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v9 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 15/19] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 11/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 12/19] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 07/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 02/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 05/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 03/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] crypto: x86 - add missing MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Zhi Wang <zhiw@xxxxxxxxxx>
- Re: [PATCH 0/2] ecdsa: Use ecc_digits_from_bytes to simplify code
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 6/6 DONOTMERGE] arm64: defconfig: enable TI MCRC64 module
- [PATCH v3 5/6 DONOTMERGE] arm64: dts: ti: k3-am62: Add dt node, cbass_main ranges for MCRC64
- [PATCH v3 2/6] crypto: crc64 - add crc64-iso3309 framework
- [PATCH v3 4/6] crypto: ti - add driver for MCRC64 engine
- [PATCH v3 1/6] lib: add ISO 3309 model crc64
- [PATCH v3 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- [PATCH v3 0/6] Add support for MCRC64 engine to calculate 64-bit CRC in Full-CPU mode
- Re: [PATCH 1/2] crypto: ecdsa - Use ecc_digits_from_bytes to create hash digits array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: "Thierry Reding" <thierry.reding@xxxxxxxxx>
- [PATCH v5 2/3] crypto: starfive: Add sm3 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] dmaengine: dw-axi-dmac: Support hardware quirks
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v5 0/3] crypto: starfive: Add support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ecdsa - Use ecc_digits_from_bytes to convert signature
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdsa - Use ecc_digits_from_bytes to create hash digits array
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/2] ecdsa: Use ecc_digits_from_bytes to simplify code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in aes_encrypt (5)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/3] crypto: starfive: Add sm4 support for JH8100
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] ecdsa: Use ecc_digits_from_bytes to simplify code
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ecdsa - Use ecc_digits_from_bytes to convert signature
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ecdsa - Use ecc_digits_from_bytes to create hash digits array
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 2/5] crypto: ccp: Move security attributes to their own file
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/5] crypto: ccp: Move security attributes to their own file
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Remove illict WARN's from tpm2-sessions.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/5] crypto: ccp: Move message about TSME being enabled later in init
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 4/5] crypto: ccp: Add support for getting security attributes on some older systems
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/5] crypto: ccp: Move security attributes to their own file
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC] crypto: sa2ul - sha1/sha256/sha512 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] docs: crypto: async-tx-api: fix broken code example
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] docs: crypto: async-tx-api: fix broken code example
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Enable PSP security attributes on more SoCs
- From: Richard Hughes <richard@xxxxxxxxxxx>
- RE: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- RE: [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- From: Vignesh Raghavendra <vigneshr@xxxxxx>
- [GIT PULL] Crypto Fixes for 6.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: starfive - Align rsa input data to 32-bit
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] lib: crypto: add missing MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 0/5] KEYS: asymmetric: tpm2_key_{rsa,ecdsa}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: ccp: Move message about TSME being enabled later in init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 4/5] crypto: ccp: Add support for getting security attributes on some older systems
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 1/5] crypto: ccp: Represent capabilities register as a union
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 2/5] crypto: ccp: Move security attributes to their own file
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 3/5] crypto: ccp: align psp_platform_access_msg
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v2 0/5] Enable PSP security attributes on more SoCs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: Frank van der Linden <fvdl@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Move security attributes to their own file
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/5] crypto: ccp: align psp_platform_access_msg
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/5] crypto: ccp: Move security attributes to their own file
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/5] crypto: ccp: Represent capabilities register as a union
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 4/5] crypto: ccp: Add support for getting security attributes on some older systems
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v16 0/5] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 4/4] crypto: stm32/cryp - call finalize with bh disabled
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v3 1/4] crypto: stm32/cryp - use dma when possible.
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v3 2/4] crypto: stm32/cryp - increase priority
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v3 3/4] crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v3 0/4] crypto: stm32/cryp - Improve stm32-cryp driver
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v16 5/5] x86: vdso: Wire up getrandom() vDSO implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v16 4/5] random: introduce generic vDSO getrandom() implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v16 2/5] random: add vgetrandom_alloc() syscall
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v16 0/5] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 1/6] tpm: Open code tpm_buf_parameters()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 6/6] keys: asymmetric: Add tpm2_key_ecdsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 5/6] keys: asymmetric: Add tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 4/6] crypto: tpm2_key: Introduce a TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 3/6] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 2/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 1/6] tpm: Open code tpm_buf_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 0/6] KEYS: asymmetric: tpm2_key_{rsa,ecdsa}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecdsa: Fix the public key format description
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] crypto: ecdsa: Fix the public key format description
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: ecdsa_set_pub_key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- ecdsa_set_pub_key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 5/5] crypto: ccp: Move message about TSME being enabled later in init
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 3/5] crypto: ccp: align psp_platform_access_msg
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 4/5] crypto: ccp: Add support for getting security attributes on some older systems
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 2/5] crypto: ccp: Move security attributes to their own file
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/5] crypto: ccp: Represent capabilities register as a union
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/5] Enable PSP security attributes on more SoCs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/1] hwrng: amd - Convert PCIBIOS_* return codes to errnos
- From: Ilpo Järvinen <ilpo.jarvinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: Remove unused struct 'tdes_keys'
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [PATCH v2 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [EXTERNAL] Re: [PATCH v2 3/6] dt-bindings: crypto: Add Texas Instruments MCRC64
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [PATCH] crypto: atmel-sha204a - fix negated return value
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [linus:master] [crypto] 996f4dcbd2: stress-ng.sockfd.ops_per_sec 11.0% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- [PATCH] crypto: testmgr - test setkey in no-SIMD context
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: x86/aes-gcm - rewrite the AES-NI optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 1/2] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 0/2] x86_64 AES-GCM improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: atmel-sha204a - fix negated return value
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH AUTOSEL 5.15 2/7] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 1/5] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 1/7] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 3/9] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 2/9] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 05/11] crypto: hisilicon/qm - Add the err memory release process to qm uninit
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 04/11] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 03/11] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 05/14] crypto: hisilicon/qm - Add the err memory release process to qm uninit
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 04/14] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 03/14] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 05/15] crypto: hisilicon/qm - Add the err memory release process to qm uninit
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 04/15] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 03/15] padata: Disable BH when taking works lock on MT path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] crypto: atmel-sha204a - fix negated return value
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- [PATCH] crypto: atmel-sha204a - fix negated return value
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH] crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH] crypto: niagara2: Remove unused struct 'n2_skcipher_request_context'
- From: "Dr. David Alan Gilbert" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Remove unused hifn_*_command structs
- From: "Dr. David Alan Gilbert" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: Remove unused struct 'tdes_keys'
- From: "Dr. David Alan Gilbert" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: acix: Remove unused struct 'dbgfs_u32'
- From: "Dr. David Alan Gilbert" <dave@xxxxxxxxxxx>
- Re: [PATCH v5 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [bug report] crypto: atmel-sha204a - add reading from otp zone
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: Add missing MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- is_module()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] docs: crypto: async-tx-api: fix broken code example
- From: Andre Noll <maan@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] docs: crypto: async-tx-api: fix broken code example
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- [PATCH v9a 08/14] x86/PM/keylocker: Restore the wrapping key on the resume from ACPI S3/4
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v9a 14/14] crypto: x86/aes-kl - Implement the AES-XTS algorithm
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] arm64/crypto: Raise priority of NEON crct10dif implementation
- From: Mark Brown <broonie@xxxxxxxxxx>
- [RFC] crypto: sa2ul - sha1/sha256/sha512 support
- From: Kamlesh Gurudasani <kamlesh@xxxxxx>
- Re: [PATCH] arm64/crypto: Raise priority of NEON crct10dif implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [REPOST PATCH v3] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/49] crypto: x86/aes-xts - Switch to new Intel CPU model defines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [REPOST PATCH v3] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] arm64/crypto: Raise priority of NEON crct10dif implementation
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: api - Do not load modules if called by async probing
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/49] crypto: x86/aes-xts - Switch to new Intel CPU model defines
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 01/49] crypto: x86/aes-xts - Switch to new Intel CPU model defines
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 2/5] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v15 0/5] implement getrandom() in vDSO
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [EXTERNAL] [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/6] tpm: Export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: api - Disable boot-test-finished if algapi is a module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH] crypto: api - Do not load modules if called by async probing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/6] tpm: Export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: acomp - Add comp_params helpers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: acomp - Add setparam interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: scomp - Add setparam interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: acomp - Add interface to set parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/5] Asymmetric TPM2 key type
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v2 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 4/5] KEYS: trusted: Migrate tpm2_key_{encode,decode}() to TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 3/5] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 2/5] tpm: export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 0/5] Asymmetric TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 4/5] KEYS: trusted: Migrate tpm2_key_{encode,decode}() to TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 3/5] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 2/5] tpm: export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 0/5] Asymmetric TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Announce loop-AES-v3.8c file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: Announce loop-AES-v3.8c file/swap crypto package
- From: Markus Reichelt <ml@xxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Move SM2 digest calculation to signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [syzbot] [arm?] [crypto?] [bcachefs?] KASAN: slab-use-after-free Read in neon_poly1305_update
- From: syzbot <syzbot+6d3021bf0c4cb4ffac17@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v2 1/2] hwrng: stm32 - use pm_runtime_resume_and_get()
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: Update Kconfig and Makefile for ppc64le x25519.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: X25519 core functions for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH v2 0/3] crypto: X25519 supports for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: stm32 - use pm_runtime_resume_and_get()
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: stm32 - cache device pointer in struct stm32_rng_private
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 1/2] hwrng: stm32 - use pm_runtime_resume_and_get()
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [GIT PULL] ASYMMETRIC KEYS: asymmetric-keys-next-6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- atmel sha: i2c bus speed under multiplexer (WAS: devicetree for Turris Omnia is missing i2c frequency for atsha204a)
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Andy Polyakov <appro@xxxxxxxxxxxxxx>
- [PATCH] KVM: SEV: Replace KVM_EXIT_VMGEXIT with KVM_EXIT_SNP_REQ_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 3/3] crypto: Update Kconfig and Makefile for ppc64le x25519.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: X25519 core functions for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: X25519 low-level primitives for ppc64le.
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- [PATCH 0/3] crypto: X25519 supports for ppc64le
- From: Danny Tsen <dtsen@xxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [syzbot] [crypto?] [bcachefs?] general protection fault in crypto_skcipher_encrypt
- From: syzbot <syzbot+2e3cb81b5d1fe18a374b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.8c file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [GIT PULL] ASYMMETRIC KEYS: asymmetric-keys-next-6.10-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] Move SM2 digest calculation to signature verification
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Crypto Update for 6.10
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] [RFC] clk: stm32mp1: Keep RNG1 clock always running
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v5 2/2] certs: Add ECDSA signature verification self-test
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] crypto: qat - Fix typo
- From: Deming Wang <wangdeming@xxxxxxxxxx>
- RE: [PATCH v3 1/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v5 2/2] certs: Add ECDSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH v5 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [GIT PULL] Crypto Update for 6.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 2/2] certs: Add ECDSA signature verification self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: niagara2: Remove unused struct 'n2_skcipher_request_context'
- [PATCH] crypto: hifn_795x: Remove unused hifn_*_command structs
- [PATCH] crypto: ccree: Remove unused struct 'tdes_keys'
- [PATCH] crypto: acix: Remove unused struct 'dbgfs_u32'
- [PATCH v4 2/2] certs: Add ECDSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH v4 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2] crypto: tcrypt - add skcipher speed for given alg
- From: Sergey Portnoy <sergey.portnoy@xxxxxxxxx>
- Re: [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/2] certs: Move RSA self-test data to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Is akcipher ready for userspace?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v3 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Is akcipher ready for userspace?
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v10 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v10 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: atmel-sha204a - read out otp zone
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug report] Kernel panic - not syncing: alg: self-tests for xxhash64 (xxhash64) failed in fips mode!
- From: Changhui Zhong <czhong@xxxxxxxxxx>
- Re: [PATCH 0/1] crypto: use 'time_left' instead of 'timeout' with wait_for_*() functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] caam: init-clk based on caam-page0-access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next 0/4] crypto: starfive - Minor fixes for AES and RSA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] certs: Move RSA self-test data to separate file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] certs: Move RSA self-test data to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in aes_encrypt (5)
- From: syzbot <syzbot+aeb14e2539ffb6d21130@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 23/23] KVM: SEV: Fix PSC handling for SMASH/UNSMASH and partial update ops
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 22/23] KVM: SEV: Fix return code interpretation for RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 21/23] KVM: MMU: Disable fast path for private memslots
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v3] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: tcrypt - add skcipher speed for given alg
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v9 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCHv3 00/19] zram: convert to custom compression API and allow algorithms tuning
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] crypto: tcrypt - add skcipher speed for given alg
- From: Sergey Portnoy <sergey.portnoy@xxxxxxxxx>
- Re: [syzbot] [btrfs] KMSAN: uninit-value in __crc32c_le_base (4)
- From: syzbot <syzbot+549710bad9c798e25b15@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v9 0/9] Turris Omnia MCU driver
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- [PATCH v9 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v9 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v9 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- [PATCH] crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH v4 5/7] dmaengine: dw-axi-dmac: Support hardware quirks
- From: JiaJie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- RE: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 1/8] crypto: shash - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 8/8] dm-verity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 7/8] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 6/8] fsverity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 5/8] crypto: arm64/sha256-ce - add support for finup_mb
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/8] crypto: x86/sha256-ni - add support for finup_mb
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 2/8] crypto: testmgr - generate power-of-2 lengths more often
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/8] crypto: testmgr - add tests for finup_mb
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/8] crypto: shash - add support for finup_mb
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/8] Optimize dm-verity and fsverity using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Conor Dooley <conor@xxxxxxxxxx>
- [syzbot] [crypto?] KASAN: slab-out-of-bounds Read in poly1305_update_arch
- From: syzbot <syzbot+9375e47164f8e9588f17@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/zip - optimize the address offset of the reg query function
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/qm - adjust the internal processing sequence of the vf enable and disable
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon - adjust vf configuration sequence and optimize zip reg offset
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in skcipher_walk_virt
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/2] fpga: zynq-fpga: use 'time_left' variable with wait_for_completion_timeout()
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [syzbot] [bcachefs] KASAN: use-after-free Read in scatterwalk_copychunks
- From: syzbot <syzbot+8c4acf719c3fc41e8439@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in skcipher_walk_virt
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [syzbot] [crypto?] KASAN: use-after-free Read in scatterwalk_copychunks
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- [syzbot] [crypto?] KASAN: use-after-free Read in scatterwalk_copychunks
- From: syzbot <syzbot+8c4acf719c3fc41e8439@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: atmel-sha204a - read out otp zone
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH v2 4/4] crypto: atmel-sha204a - provide the otp content
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH v2 3/4] crypto: atmel-sha204a - add reading from otp zone
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH v2 2/4] crypto: atmel-i2c - rename read function
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH v2 1/4] crypto: atmel-i2c - add missing arg description
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- Re: [PATCH] crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/8] crypto: shash - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in skcipher_walk_virt
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in skcipher_walk_virt
- From: syzbot <syzbot+97b4444a5bd7bf30b3a8@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon - fix reg offset issue and cleanup dump information
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - specify firmware files for 402xx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: stm32/cryp - use dma when possible.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: atmel-sha204a - remove unused includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/7] Add SPAcc ahash support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] crypto: shash - add support for finup2x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- [PATCH v3 2/2] certs: Add ECDSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH v3 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 0/2] fpga: use 'time_left' instead of 'timeout' with wait_for_*() functions
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] fpga: zynq-fpga: use 'time_left' variable with wait_for_completion_timeout()
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] fpga: socfpga: use 'time_left' variable with wait_for_completion_interruptible_timeout()
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
- From: Thorsten Blum <thorsten.blum@xxxxxxxxxx>
- RE: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Aaron Toponce <aaron.toponce@xxxxxxxxx>
- Re: [PATCH 0/4] crypto: Add new compression modes for zlib and IAA
- From: Andre Glover <andre.glover@xxxxxxxxxxxxxxx>
- [RFC PATCH 3/3] crypto: Add deflate-canned-byN algorithm to IAA
- From: Andre Glover <andre.glover@xxxxxxxxxxxxxxx>
- [RFC PATCH 2/3] crypto: add by_n attribute to acomp_req
- From: Andre Glover <andre.glover@xxxxxxxxxxxxxxx>
- [RFC PATCH 1/3] crypto: Add pre_alloc and post_free callbacks for acomp algorithms
- From: Andre Glover <andre.glover@xxxxxxxxxxxxxxx>
- [RFC PATCH 0/3] by_n compression and decompression with Intel IAA
- From: Andre Glover <andre.glover@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: crypto: fix build when CONFIG_CRYPTO=m
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH bpf-next] bpf: crypto: fix build when CONFIG_CRYPTO=m
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Aaron Toponce <aaron.toponce@xxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Jean-Philippe Aumasson <jeanphilippe.aumasson@xxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v15 08/20] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 07/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 06/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 05/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 04/20] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 03/20] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 01/20] Revert "KVM: x86: Add gmem hook for determining max NPT mapping level"
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 20/20] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 18/20] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 17/20] KVM: SVM: Add module parameter to enable SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 16/20] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 15/20] KVM: x86: Implement hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 14/20] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 12/20] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 11/20] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 10/20] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] KVM: SEV: Allow per-guest configuration of GHCB protocol version
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 3/4] KVM: SEV: Add GHCB handling for termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 2/4] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 1/4] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 0/4] Add SEV-ES hypervisor support for GHCB protocol version 2
- From: Michael Roth <michael.roth@xxxxxxx>
- RE: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v2 1/2] certs: Move RSA self-test data to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/1] crypto: use 'time_left' instead of 'timeout' with wait_for_*() functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Aaron Toponce <aaron.toponce@xxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 1/1] crypto: sahara: use 'time_left' variable with wait_for_completion_timeout()
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: api - use 'time_left' variable with wait_for_completion_killable_timeout()
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] crypto: use 'time_left' instead of 'timeout' with wait_for_*() functions
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v8 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v8 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v8 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- RE: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- RE: [PATCH v5 09/10] crypto: qat - implement interface for live migration
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Aaron Toponce <aaron.toponce@xxxxxxxxx>
- Re: [PATCH] hwrng: mxc-rnga: Drop usage of platform_driver_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] crypto: passing configuration parameters to comp algos
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [RFC] crypto: passing configuration parameters to comp algos
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] random: add chacha8_block and swtich the rng to it
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 09/10] crypto: qat - implement interface for live migration
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [RFC] crypto: passing configuration parameters to comp algos
- From: Sergey Senozhatsky <senozhatsky@xxxxxxxxxxxx>
- Re: [PATCH] hwrng: mxc-rnga: Drop usage of platform_driver_probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] crypto/nx: Avoid potential -Wflex-array-member-not-at-end warning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: David Sterba <dsterba@xxxxxxx>
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: David Sterba <dsterba@xxxxxxx>
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: David Sterba <dsterba@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]