Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2] fscrypt: log the crypto algorithm implementations
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] fscrypt: add Speck128/256 support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Stephan Müller <smueller@xxxxxxxxxx>
- 4.16: /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: x86/aegis256 - Fix wrong key buffer size
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 6/6] crypto: testmgr - add more unkeyed crc32 and crc32c test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/6] crypto: testmgr - fix testing OPTIONAL_KEY hash algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/6] crypto: testmgr - remove bfin_crc "hmac(crc32)" test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/6] crypto: crc32-generic - remove __crc32_le()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/6] crypto: crc32c-generic - remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/6] crypto: crc32-generic - use unaligned access macros when needed
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/6] crypto: crc32 cleanups and unkeyed tests
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [cryptodev:master 68/69] crypto/morus640_glue.c:147:2: error: too few arguments to function 'kernel_fpu_begin'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: chtls - fix a missing-check bug
- From: Wenwen Wang <wang6495@xxxxxxx>
- Re: [PATCH 0/4] Add support for MORUS AEAD algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Add support for AEGIS AEAD algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx: fix spelling mistake: "seqeunce" -> "sequence"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: request to HW should wrap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: n2: fix spelling mistake: "restesting" -> "retesting"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: log the crypto algorithm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH v6 07/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 09/28] x86/asm: annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] fscrypt: log the crypto algorithm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - do not use memset on MMIO
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccree: drop signature register check
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- linux-next: WARNING: CPU: 0 PID: 41 at crypto/testmgr.c:3720 alg_test+0x117/0x520
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Abdul Haleem <abdhalee@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: ccree: drop signature register check
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] enable ccree on Renesas R-Car platform
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit Europe 2018 - CFP
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: inside-secure - rework cipher functions for future AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 06/10] crypto: inside-secure - fix the hash then encrypt/decrypt types
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 05/10] crypto: inside-secure - make the key and context size computation dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 09/10] crypto: inside-secure - authenc(hmac(sha224),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 08/10] crypto: inside-secure - authenc(hmac(sha256),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 00/10] crypto: inside-secure - AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 04/10] crypto: inside-secure - make the context control size dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 10/10] crypto: inside-secure - authenc(hmac(sha1),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 07/10] crypto: inside-secure - improve error reporting
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 01/10] crypto: inside-secure - remove VLAs
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 03/10] crypto: inside-secure - rework the alg type settings in the context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: chtls: generic handling of data and hdr
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/5] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 0/5] build warnings cleanup
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 4/5] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 5/5] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 3/5] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFC] crypto: Remove mcryptd
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- RE: [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: vmx - Remove overly verbose printk from AES XTS init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH resend 00/10] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: x86 - Add optimized MORUS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 2/4] crypto: testmgr - Add test vectors for MORUS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 3/4] crypto: Add common SIMD glue code for MORUS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 1/4] crypto: Add generic MORUS AEAD implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/4] Add support for MORUS AEAD algorithm
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 2/3] crypto: testmgr - Add test vectors for AEGIS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 1/3] crypto: Add generic AEGIS AEAD implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/3] Add support for AEGIS AEAD algorithm
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: reorder paes test lexicographically
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [next-20180509][bisected a794d8d] ppc boot warnings at crypto/testmgr.c:3720
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 08/18] random: Remove pr_fmt duplicate logging prefixes
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 00/18] Convert default pr_fmt from empty to KBUILD_MODNAME
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH -resend 08/27] x86: assembly, annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 06/27] x86: crypto, annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] crypto: chelsio: request to HW should wrap
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCH RESEND 2/2] Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/11] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- DMA map buffer allocated in ahash_request_ctx
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] crypto: nx: fix spelling mistake: "seqeunce" -> "sequence"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] hwrng: n2: fix spelling mistake: "restesting" -> "retesting"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: add Speck128/256 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v17 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: IV generation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: IV generation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: chtls - fix a missing-check bug
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 11/18] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: chtls - fix a missing-check bug
- From: Wenwen Wang <wang6495@xxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- Re: [PATCH] crypto: ghash-clmulni: fix spelling mistake: "acclerated" -> "accelerated"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix size of RSA prime factor q
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Fix stm32-rng for default state and suspend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: implement SM4 for arm64 using special instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] cleanup and hardware keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] async_pq: Remove VLA usage
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- [PATCH 2/2] crypto: vmx - Remove overly verbose printk from AES XTS init
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- [PATCH 4.9.y, 4.14.y] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCH 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 02/10] crypto: inside-secure - rework cipher functions for future AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/10] crypto: inside-secure - make the context control size dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/10] crypto: inside-secure - authenc(hmac(sha224),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/10] crypto: inside-secure - authenc(hmac(sha1),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/10] crypto: inside-secure - authenc(hmac(sha256),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/10] crypto: inside-secure - rework the alg type settings in the context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/10] crypto: inside-secure - improve error reporting
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/10] crypto: inside-secure - AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/10] crypto: inside-secure - fix the hash then encrypt/decrypt types
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/10] crypto: inside-secure - make the key and context size computation dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- [PATCH v2 7/7] crypto: chtls: HW supported socket opt
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 6/7] crypto: chtls: generic handling of data and hdr
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 5/7] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 4/7] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 3/7] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 2/7] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH resend 10/10] crypto: arm64/sha512-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 09/10] crypto: arm64/sha3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 08/10] crypto: arm64/crct10dif-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 07/10] crypto: arm64/crc32-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 06/10] crypto: arm64/aes-ghash - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 05/10] crypto: arm64/aes-bs - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 04/10] crypto: arm64/aes-blk - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 03/10] crypto: arm64/aes-ccm - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 02/10] crypto: arm64/sha2-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 01/10] crypto: arm64/sha1-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 00/10] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/7] crypto: crypto4xx - performance optimizations
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH v1 1/7] crypto: crypto4xx - performance optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/61] crypto: simplify getting .drvdata
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham: fix memleak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ghash-clmulni: fix spelling mistake: "acclerated" -> "accelerated"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: caam - fix size of RSA prime factor q
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: tcrypt: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: removing various VLAs
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] chtls: free beyond end of array rspq_skb_cache
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 5/7] chtls: free beyond end of array rspq_skb_cache
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 4/7] chtls: kbuild warnings
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [GIT PULL] /dev/random fixes for 4.17-rc3
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Samuel Neves <samuel.c.p.neves@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: ccree: enable support for hardware keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 7/7] chtls: handling HW supported sockopt
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
- From: <yael.chemla@xxxxxxxxxxxx>
- [PATCH 6/7] chtls: generic handling for data and header
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 5/7] chtls: free beyond end of array rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 4/7] chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 3/7] chtls: variable dereferenced before null check
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 2/7] chtls: support only 128b key length
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/7] chtls: wait for memory in Tx path
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Samuel Neves <samuel.c.p.neves@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] crypto: arm64 - add support for SM4 encryption using special instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto: implement SM4 for arm64 using special instructions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Paul Crowley <paulcrowley@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: remove Speck
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Question on random.c add_interrupt_randomness function
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: remove Speck
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Question on random.c add_interrupt_randomness function
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: GCM and XTS: kcapi result not matching with NIST vectors
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] hwrng: stm32-rng - fix pm_suspend issue
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/2] Fix stm32-rng for default state and suspend
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/2] hwrng: stm32 - define default state for rng driver
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: limit build to plausible archs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: ccree: limit build to plausible archs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs at (ptrval) in syzkaller has bad 'bp' value (ptrval)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: GCM and XTS: kcapi result not matching with NIST vectors
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 0/2] cleanup and hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: ccree: use proper printk format
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- GCM and XTS: kcapi result not matching with NIST vectors
- From: Jitendra Lulla <lulla.jitendra@xxxxxxxxx>
- Re: [PATCH v16 2/7] parisc: iomap: introduce io{read|write}64
- From: Helge Deller <deller@xxxxxx>
- [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH v16 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v16 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] hwrng: via-rng - support new Centaur CPU
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - fix finding algorithm currently being tested
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: - Use kmemdup() function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - strip input zeros from RSA input buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drbg - set freed buffers to NULL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - Remove unneeded error assignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: Allow different compression results
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: chtls: don't leak information from the stack to userspace
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto : chtls_cm - Fix potential NULL pointer dereferences
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: chtls: remove redundant assignment to cdev->ports
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: Allow different compression results
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: removing various VLAs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] crypto: caam - staticize caam_get_era()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] ThunderX ZIP driver bug fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: authencesn - don't leak pointers to authenc keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] crypto: Add zstd support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: authenc - don't leak pointers to authenc keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Actually remove stack VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: caam - IV-related fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] add compression algorithm zBeWalgo
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 06/61] crypto: simplify getting .drvdata
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: WARNING: kernel stack frame pointer has bad value
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v1 1/7] crypto: crypto4xx - performance optimizations
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 6/7] crypto: crypto4xx - extend aead fallback checks
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 7/7] crypto: crypto4xx - put temporary dst sg into request ctx
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 2/7] crypto: crypto4xx - convert to skcipher
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 3/7] crypto: crypto4xx - avoid VLA use
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 5/7] crypto: crypto4xx - properly set IV after de- and encrypt
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 4/7] crypto: crypto4xx - add aes-ctr support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [RESEND PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- [PATCH 06/61] crypto: simplify getting .drvdata
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/61] tree-wide: simplify getting .drvdata
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: Allow different compression results
- From: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: Allow different compression results
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham: fix memleak
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 18/20] spi: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: omap-sham: fix memleak
- From: Bin Liu <b-liu@xxxxxx>
- [PATCH v3 17/20] serial: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 13/20] mmc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 19/20] staging: vc04_services: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 05/20] firewire: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 12/20] media: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 07/20] i2c: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 14/20] mtd: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 06/20] fpga: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- [PATCH v3 16/20] remoteproc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 02/20] ata: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 00/20] Allow compile-testing NO_DMA (drivers)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 11/20] mailbox: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 03/20] crypto: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 09/20] iommu: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 15/20] net: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 01/20] ASoC: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 04/20] fbdev: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 20/20] usb: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 10/20] lightnvm: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v3 08/20] iio: adc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam: - Use kmemdup() function
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: api - fix finding algorithm currently being tested
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: caam - strip input zeros from RSA input buffer
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Yann Collet <cyan@xxxxxx>
- [PATCH v2] crypto: caam: - Use kmemdup() function
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Actually remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: - Use kmemdup() function
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: caam: - Use kmemdup() function
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: caam: - Use kmemdup() function
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v3] crypto: caam: Drop leading zero from input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH] crypto: caam: Drop leading zero from input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2] crypto: caam: Drop leading zero from input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: caam: Drop leading zero from input buffer
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- [PATCH] crypto: caam: Drop leading zero from input buffer
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] ARM: bcm283x: Add missing interrupt for RNG block
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 1/2] dt-binding: rng: Add interrupt property for BCM2835
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH v7 2/5] crypto: add zBeWalgo to crypto-api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/5] crypto: add unsafe decompression to api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] crypto: configurable compression level
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] crypto: add flag for unstable encoding
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] hwrng: via-rng - support new Centaur CPU
- From: David Wang <davidwang@xxxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 2/5] random: use a different mixing algorithm for add_device_randomness()
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 4/5] random: crng_reseed() should lock the crng instance that it is modifying
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 5/5] random: add new ioctl RNDRESEEDCRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Breno Matheus Lima <brenomatheus@xxxxxxxxx>
- libkcapi v1.1.0 released
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: drbg - set freed buffers to NULL
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: rsa - Remove unneeded error assignment
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: testmgr: Allow different compression results
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- Re: [PATCH] crypto: drbg - set freed buffers to NULL
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- RE: [PATCH v2 0/2] crypto: removing various VLAs
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH] crypto: drbg - set freed buffers to NULL
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v4 1/2] crypto: caam - staticize caam_get_era()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v3 1/2] crypto: caam - staticize caam_get_era()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: "Bryan O'Donoghue" <bryan.odonoghue@xxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit North America 2018 - CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: removing various VLAs
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH v2 1/5] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH v2 0/5] ThunderX ZIP driver bug fixes
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: thunderx_zip: Fix smp_processor_id() warnings
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: thunderx_zip: Fix statistics pending request value
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: thunderx_zip: Prevent division by zero
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: thunderx_zip: Limit result reading attempts
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 0/2] crypto: removing various VLAs
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 6/6] crypto: cfb - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 4/6] crypto: pcbc - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 5/6] crypto: cts - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 3/6] crypto: api - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH v2 1/2] crypto: api - laying defines and checks for statically allocated buffers
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH v2 0/2] crypto: removing various VLAs
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH v2 2/2] crypto: remove several VLAs
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 2/6] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 0/6] Remove several VLAs in the crypto subsystem
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 3/6] crypto: api - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] AF_ALG: register completely initialized request in list
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] AF_ALG: register completely initialized request in list
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: INFO: task hung in exit_aio
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: DRBG - guard uninstantion by lock
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: DRBG - guard uninstantion by lock
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC 0/2] add integrity and security to TPM2 transactions
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- [PATCH] AF_ALG: register completely initialized request in list
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: WARNING in kmem_cache_free
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: WARNING in kmem_cache_free
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: WARNING in kmem_cache_free
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 3/6] crypto: api - avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: ctr - avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: api - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 2/6] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- KMSAN: uninit-value in af_alg_free_areq_sgls
- From: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: ctr - avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: api - avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 4/6] crypto: pcbc - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 3/6] crypto: api - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 5/6] crypto: cts - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 6/6] crypto: cfb - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 2/6] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH 0/6] Remove several VLAs in the crypto subsystem
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [PATCH][next] crypto: chtls: remove redundant assignment to cdev->ports
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][next] crypto: chtls: don't leak information from the stack to userspace
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [RESEND] SHASH_DESC_ON_STACK macro
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
- From: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Crypto Update for 4.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug report] crypto: chtls - Program the TLS session Key
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [bug report] crypto: chtls - Inline TLS record Tx
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [bug report] crypto: chtls - Register chtls with net tls
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [bug report] crypto: chtls - Inline TLS record Rx
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [bug report] crypto: chtls - Inline TLS record Tx
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [bug report] crypto: chtls - Inline TLS record Tx
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [crypto-chtls] Supicious code in chtls_io
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [v3] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- [crypto-chtls] Supicious code in chtls_io
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [v3] crypto: ctr - avoid VLA use
- From: Laura Abbott <labbott@xxxxxxxxxx>
- [PATCH] crypto : chtls_cm - Fix potential NULL pointer dereferences
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- RE: Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - remove unneeded initializations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: authencesn - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: authenc - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - remove unneeded initializations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH v15 net-next 01/12] tls: support for Inline tls record
- From: Boris Pismenny <borisp@xxxxxxxxxxxx>
- Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
- From: Boris Pismenny <borisp@xxxxxxxxxxxx>
- Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v15 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 11/12] crypto: chtls - Program the TLS session Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 10/12] crypto: chtls - Inline TLS record Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 07/12] crypto: chtls - Register chtls with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 04/12] cxgb4: LLD driver changes to support TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 05/12] crypto: chcr - Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 03/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [RESEND PATCH] crypto: Add zstd support
- From: Nick Terrell <terrelln@xxxxxx>
- [RESEND PATCH] crypto: Add zstd support
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH 1/2] crypto: ccree: remove unused enums
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] crypto: don't leak pointers to authenc keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - remove unneeded initializations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] crypto: Add zstd support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto/ecc: Actually remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
- From: Ganesh Goudar <ganeshgr@xxxxxxxxxxx>
- [v3] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 11/12] crypto: chtls - Register chtls with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 10/12] crypto: chtls - Inline TLS record Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 07/12] crypto: chtls - Program the TLS session Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 05/12] crypto: chcr - Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 04/12] cxgb4: LLD driver changes to support TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 03/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v14 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] sunrpc: remove incorrect HMAC request initialization
- From: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] sunrpc: remove incorrect HMAC request initialization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- [PATCH 3/3] crypto: caam/qi - fix IV DMA mapping and updating
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/3] crypto: caam - fix IV DMA mapping and updating
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam - fix DMA mapping dir for generated IV
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/3] crypto: caam - IV-related fixes
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
- From: Stefan Agner <stefan@xxxxxxxx>
- [PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 2/2] crypto: thunderx_zip: Limit result reading attempts
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [SPAMMY (6.9)]Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v15 9/9] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 2/9] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 7/9] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 1/9] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 6/9] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 8/9] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 3/9] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 4/9] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v15 5/9] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- [PATCH v13 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 11/12] crypto: chtls - Register chtls with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 10/12] crypto: chtls - Inline TLS record Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 05/12] crypto: chcr - Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 04/12] cxgb4: LLD driver changes to support TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 03/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v13 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- RE: [PATCH] omap-aes - fix crypto cleanup
- From: Francis Le Bourse <francis.lebourse@xxxxxx>
- RE: [PATCH] omap-crypto - fix kernel oops and output buffer update
- From: Francis Le Bourse <francis.lebourse@xxxxxx>
- Re: [RESEND] SHASH_DESC_ON_STACK macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
- From: <yael.chemla@xxxxxxxxxxxx>
- RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
- From: <yael.chemla@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 07/10] kbuild: clean up *-asn1.[ch] patterns from top-level Makefile
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 08/10] kbuild: rename *-asn1.[ch] to *.asn.[ch]
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] .gitignore: move *-asn1.[ch] patterns to the top-level .gitignore
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v3] crypto: ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: in-kernel user of ecdsa
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/12] ima: Introduce is_ima_sig()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/12] ima: Write modsig to the measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rsa - remove unneeded initializations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v6 0/5] add compression algorithm zBeWalgo
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v6 4/5] crypto: configurable compression level
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] crypto: add zBeWalgo to crypto-api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] crypto: add unsafe decompression to api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] crypto: add flag for unstable encoding
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: ccree: cleanup and hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ccree: remove unused enums
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ccree: enable support for hardware keys
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2] crypto: ahash - Fix early termination in hash walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ahash - Fix early termination in hash walk
- From: Eli Cooper <elicooper@xxxxxxx>
- Re: [PATCH v2] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
- From: Stefan Agner <stefan@xxxxxxxx>
- [RESEND] SHASH_DESC_ON_STACK macro
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure: improve clock management
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]