Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH v1 5/5] crypto: ccp: Add support for new CCP/PSP device ID
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 4/5] crypto: ccp: Support register differences between PSP devices
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 3/5] crypto: ccp: Remove unused #defines
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 2/5] crypto: ccp: Add psp enabled message when initialization succeeds
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 1/5] crypto: ccp: Fix command completion detection race
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 0/5] crypto: ccp - Driver updates 2018-07-03
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: linux-next crash in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- linux-next crash in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/6] dt-bindings: crypto: Move prng binding to crypto
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 4/6] dt-bindings: crypto: Add new compatible qcom,prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 5/6] crypto: qcom: Add support for prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 1/6] hwrng: remove msm hw_random driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 0/6] crypto: Add Qcom PRNG support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 9/9 v2] crypto: atmel-ecc: Break out lock check helper
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 7/9 v2] crypto: atmel-ecc: Print out serial number
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: ccree: rate limit debug print
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH net] ipv6: sr: fix passing wrong flags to crypto_alloc_shash()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 6/9 v2] crypto: atmel-ecc: Marshal the command while sending
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/9 v2] crypto: atmel-ecc: More helpful error messages
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/9 v2] crypto: atmel-ecc: Just warn on missing clock frequency
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: zip: make several functions static
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- [PATCH] staging/skein: Remove Skein and Threefish code
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: skcipher: remove the exporting of skcipher_walk_next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: vmac - various fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] crypto: testmgr: add hash finup tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/6] crypto: ccree: remove dead legacy code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/6] crypto: ccree: use CBC-CS3 CTS mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/6] crypto: ccree: rate limit debug print
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/6] crypto: ccree: fix iv handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/6] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/6] crypto: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto: skcipher - remove useless setting of type flags
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: ahash - remove useless setting of cra_type
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: ahash - remove useless setting of type flags
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH net] ipv6: sr: fix passing wrong flags to crypto_alloc_shash()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 6/6] crypto: remove redundant type flags from tfm allocation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/6] crypto: skcipher - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/6] crypto: aead - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/6] crypto: ahash - remove useless setting of cra_type
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/6] crypto: ahash - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/6] crypto: shash - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/6] crypto: remove redundant type specifications
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: zip: make several functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/4] crypto: x86/sha-mb - decrease priority of multibuffer algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/4] crypto: sha512_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/4] crypto: sha256_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/4] crypto: sha1_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/4] crypto: decrease priority of multibuffer SHA algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: MAINTAINERS - fix file path for SHA multibuffer code
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH v3 0/9] Crypto: Remove VLA usage (part 1)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/9] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/9] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/9] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/9] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/9] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 7/9] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 8/9] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Timur Tabi <timur@xxxxxxxxxx>
- [PATCH 03/14] Documentation/bindings: crypto: inside-secure: update the compatibles
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/14] crypto: inside-secure - filter out the algorithms by engine
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/14] crypto: inside-secure - move the firmware to a better location
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/14] crypto: inside-secure - use precise compatibles
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/14] crypto: inside-secure - dynamic ring configuration allocation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/14] crypto: inside-secure - eip197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/5] crypto: inside-secure - hmac(md5) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 3/5] crypto: inside-secure - ecb(des) and cbc(des) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/5] crypto: inside-secure - md5 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 5/5] crypto: inside-secure - remove request list to improve performance
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 0/5] crypto: inside-secure - support more algorithms
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 4/5] crypto: inside-secure - ecb(des3_ede) and cbc(des3_ede) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/14] crypto: inside-secure - add multiple processing engine support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 13/14] arm64: dts: marvell: armada-cp110: update the crypto engine compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/14] crypto: inside-secure - reset CDR and RDR rings on module removal
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/14] crypto: inside-secure - set tx_max_cmd_queue to 32
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 14/14] arm64: dts: marvell: armada-37xx: update the crypto engine compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/14] Documentation/bindings: crypto: inside-secure: eip197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/14] crypto: inside-secure - add an invalidation flag
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/14] crypto: inside-secure - adjust the TRC configuration for EIP197D
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/14] crypto: inside-secure - EIP197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 5/9 v2] crypto: atmel-ecc: Create a config word reader
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 7/9 v2] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 6/9 v2] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 8/9 v2] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 9/9 v2] crypto: atmel-ecc: Break out lock check helper
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 4/9 v2] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 3/9 v2] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/9 v2] crypto: atmel-ecc: Just warn on missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/9 v2] crypto: atmel-ecc: Make available for other platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: ccree: fix iv handling
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] crypto: ccree: cc_update_ctr() can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/4] crypto: testmgr: add hash finup tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: fix iv handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: remove dead legacy code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH v2] crypto: DH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: DH - add public key verification test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/3] crypto: stm32/cryp - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 3/3] crypto: stm32/crc - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] crypto: stm32/hash - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/3] crypto: stm32 - Add power mamagement support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RFC PATCH] crypto: DH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5 01/27] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 00/11] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 03/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 04/11] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 06/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 07/11] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 08/11] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 05/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 02/11] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH v2 0/2] Fix GCC -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH] crypto: ECDH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- [PATCH] x86/crypto: Add missing RETs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Max Filippov <jcmvbkbc@xxxxxxxxx>
- [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- [RFC PATCH 0/2] Fix GCC -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [cryptodev:master 9/15] drivers/crypto/inside-secure/safexcel_hash.c:1373:25: sparse: cast truncates bits from constant value (cbbb9d5dc1059ed8 becomes c1059ed8)
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- [cryptodev:master 5/15] drivers/crypto/inside-secure/safexcel_hash.c:1299:25: sparse: cast truncates bits from constant value (6a09e667f3bcc908 becomes f3bcc908)
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v18 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: sahara - Add i.MX51 entry
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara - Add i.MX51 entry
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH][next] crypto: aegis: fix indentation of a statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: make structure algs static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - remove overly verbose dev_info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - fix to allow multi segment scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: inside-secure - sha512/384 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - increase minimum transfer size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: thunderx_zip - Make functions static
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 2/5] crypto: thunderx_zip - Add driver names and module aliases
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 1/5] crypto: deflate - Rename to generic
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 0/5] Improve crypto compression tests
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccree: fix finup
- From: Hadar Gat <hadar.gat@xxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Juan Manuel Torres Palma <j.m.torrespalma@xxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 03/11] crypto: ahash: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/11] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/11] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/11] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: add test vectors for skein
- From: Juan Manuel Torres Palma <j.m.torrespalma@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH] [net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] crypto: skcipher: remove the exporting of skcipher_walk_next
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto/virtio-crypto: Register an algo only if it's supported
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto/virtio-crypto: Read crypto services and algorithm masks
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher: remove static declaration of export function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] [net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- Re: [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- general protection fault in scatterwalk_copychunks (3)
- From: syzbot <syzbot+db0b320fadd1b9853ebb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- crypto-vmx fails to load fallbacks (missing dep?)
- From: Matt Corallo <linux@xxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher: remove static declaration of export function
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/4] crypto: vmac - remove insecure version with hardcoded nonce
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/4] crypto: vmac - add nonced version with big endian digest
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/4] crypto: vmac - separate tfm and request context
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/4] crypto: vmac - require a block cipher with 128-bit block size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/4] crypto: vmac - various fixes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 0/3]: hwrng: Add support for qcpm v2 hwrng
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 2/3] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH] crypto: skcipher: remove static declaration of export function
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in vmac_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- KASAN: slab-out-of-bounds Write in vmac_final
- From: syzbot <syzbot+264bca3a6e8d645550d3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/26] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v4 02/26] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: morus640 - Fix out-of-bounds access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: don't optimize keccakf()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls - use after free in chtls_pt_recvmsg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 05/27] docs: Fix some broken references
- From: Coly Li <colyli@xxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Michael Büsch <m@xxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- [PATCH v3 02/27] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v3 05/27] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- [PATCH] crypto: morus640 - Fix out-of-bounds access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+d82643ba80bf6937cd44@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel-ecc - remove overly verbose dev_info
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel-ecc - fix to allow multi segment scatterlists
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- KASAN: use-after-free Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+d82643ba80bf6937cd44@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+1fafa9c4cf42df33f716@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+1fafa9c4cf42df33f716@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH V3 2/2] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V3 1/2] powerpc/powernv: Export opal_check_token symbol
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 1/9] crypto: atmel-ecc: Make available for other platforms
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V3 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Support additional signature types in EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: don't optimize keccakf()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: don't optimize keccakf()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- possible uninitialized walk.flags in skcipher_walk_virt?
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin, _end
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: James Morris <jmorris@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_finup
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha1_finup
- From: syzbot <syzbot+486f97f892efeb2075a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_final
- From: syzbot <syzbot+8a608baf8751184ec727@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha256_final
- From: syzbot <syzbot+8a608baf8751184ec727@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha1_finup
- From: syzbot <syzbot+486f97f892efeb2075a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha256_finup
- From: syzbot <syzbot+29d17b7898b41ee120a5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Ladvine D Almeida <Ladvine.DAlmeida@xxxxxxxxxxxx>
- [PATCH V2] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH 9/9] crypto: atmel-ecc: Break out lock check helper
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 5/9] crypto: atmel-ecc: Create a config word reader
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/9] crypto: atmel-ecc: Make available for other platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Crypto Update for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Ladvine D Almeida <Ladvine.DAlmeida@xxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Oliver <oohall@xxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: Speck support
- From: Tomer Ashur <tomer.ashur@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cavium: make structure algs static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: chtls - use after free in chtls_pt_recvmsg()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [RFC] crypto: Remove mcryptd
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 0/5] build warnings cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove x86 salsa20 implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto:chelsio: Fixes and cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: caam - fix MC firmware detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: clarify licensing of OpenSSL asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Mark MORUS SIMD glue as x86-specific
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: eliminate redundant decryption test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH][next] crypto: aegis: fix indentation of a statement
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] crypto: ccree: better clock handling
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: ccree: silence debug prints
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Nick Desaulniers <nick.desaulniers@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v4 01/27] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_destroy_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 02/10] crypto: inside-secure - improve the counter computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/10] crypto: sha512_generic - add a sha512 0-length pre-computed hash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/10] crypto: inside-secure - sha512 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/10] crypto: inside-secure - use the error handler for invalidation requests
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/10] crypto: inside-secure - hmac(sha512) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/10] crypto: sha512_generic - add a sha384 0-length pre-computed hash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/10] crypto: inside-secure - sha384 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/10] crypto: inside-secure - hmac(sha384) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/10] crypto: inside-secure - authenc(hmac(sha384),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/10] crypto: inside-secure - authenc(hmac(sha512),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/10] crypto: inside-secure - sha512/384 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v2 4/5] clk: renesas: r8a7795: add ccree clock bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Nick Desaulniers <nick.desaulniers@xxxxxxxxx>
- Re: [PATCH] crypto: morus - Hide Kconfig option for glue code
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: morus - Hide Kconfig option for glue code
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: inside-secure - increase minimum transfer size
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- [PATCH v2 0/5] build warnings cleanup
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 1/5] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 3/5] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 5/5] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 4/5] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: KASAN: use-after-free Read in crypto_destroy_tfm
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- KASAN: use-after-free Read in crypto_destroy_tfm
- From: syzbot <syzbot+352126a5be7ccb25754e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aegis256 - Fix wrong key buffer size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: crc32 cleanups and unkeyed tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls - fix a missing-check bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - do not use memset on MMIO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] crypto: inside-secure - AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls: generic handling of data and hdr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/2] crypto: x86/salsa20 - remove x86 salsa20 implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/2] crypto: salsa20 - Revert "crypto: salsa20 - export generic helpers"
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/2] crypto: remove x86 salsa20 implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCHv2 1/2] crypto: ccp: Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCHv2 2/2] crypto: ccp: Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCHv2 0/2] Add new SEV commands
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [bug report] crypto: chtls - Register chtls with net tls
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- [PATCH] Add MODULE_FIRMWARE for all qat drivers
- From: Conor McLoughlin <conor.mcloughlin@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v2 2/5] crypto: ccree: better clock handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: ccree: silence debug prints
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/5] clk: renesas: r8a7795: add ccree clock bindings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] crypto:chelsio: Fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/3] crypt:chelsio:Send IV as Immediate for cipher algo
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/3] crypto:chelsio: Remove separate buffer used for DMA map B0 block in CCM
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/3] crypto:chelsio:Return -ENOSPC for transient busy indication.
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Yu Chen <yu.chen.surf@xxxxxxxxx>
- [PATCH 3/3] crypto: caam/qi - fix warning in init_cgr()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/3] crypto: caam - fix rfc4543 descriptors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam - fix MC firmware detection
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v7 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH] crypto: clarify licensing of OpenSSL asm code
- From: Adam Langley <agl@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: "Natarajan, Janakarajan" <jnataraj@xxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- PBKDF2 support in the linux kernel
- From: Yu Chen <yu.chen.surf@xxxxxxxxx>
- [PATCH v2] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: testmgr - eliminate redundant decryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/5] crypto: testmgr - add extra kw(aes) encryption test vector
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/5] crypto: testmgr - add extra ecb(tnepres) encryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/5] crypto: testmgr - make an cbc(des) encryption test vector chunked
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/5] crypto: testmgr - add extra ecb(des) encryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/5] crypto: eliminate redundant decryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]