Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 0/4] Introduce TEE bus driver framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: IPSec ESN: Packets decryption fail with ESN enabled connection
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: Add Xilinx SHA3 driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH RT] padata: Make padata_do_serial() use get_cpu_light()
- From: Daniel Bristot de Oliveira <bristot@xxxxxxxxxx>
- [RFC PATCH V2 3/4] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V2 4/4] ARM64: zynqmp: Add Xilinix SHA-384 node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V2 0/4] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V2 2/4] firmware: xilinx: Add ZynqMP sha_hash API for SHA3 functionality
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH V2 1/4] dt-bindings: crypto: Add bindings for ZynqMP SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- RE: [RFC PATCH 2/3] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyania@xxxxxxxxxx>
- [PATCH] crypto: sm3 - fix undefined shift by >= width of value
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 -next] crypto: brcm - Fix some set-but-not-used warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: brcm - Fix some set-but-not-used warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: brcm - Fix some set-but-not-used warning
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 17/97] crypto: ecc - regularize scalar for scalar multiplication
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.20 020/117] crypto: ecc - regularize scalar for scalar multiplication
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4 1/2] crypto: talitos - reorder code in talitos_edesc_alloc()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v4 2/2] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4 1/2] crypto: talitos - reorder code in talitos_edesc_alloc()
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 4.9,4.4] crypto: x86/chacha20 - avoid sleeping with preemption disabled
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v4 1/2] crypto: talitos - reorder code in talitos_edesc_alloc()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] virtio-rng: Avoid repeated init of completion
- From: David Tolnay <dtolnay@xxxxxxxxx>
- [PATCH 4.9,4.4] crypto: x86/chacha20 - avoid sleeping with preemption disabled
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - split akcipher tests by a key type
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [RFC PATCH 2/3] crypto: Add Xilinx SHA3 driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: Add Xilinx SHA3 driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 2/3] crypto: Add Xilinx SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH 1/3] dt-bindings: crypto: Add bindings for ZynqMP SHA3 driver
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH 0/3] Add Xilinx's ZynqMP SHA3 driver support
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- [RFC PATCH 3/3] ARM64: zynqmp: Add Xilinix SHA-384 node.
- From: Kalyani Akula <kalyani.akula@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] crypto: shash - remove pointless checks of shash_alg::{export,import}
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: shash - require neither or both ->export() and ->import()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/3] crypto: skcipher - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: aead - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: set CRYPTO_TFM_NEED_KEY if ->setkey() fails
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 05/16] crypto: skcipher - add helper for simple block cipher modes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: adiantum - initialize crypto_spawn::inst
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: algapi - reject NULL crypto_spawn::inst
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] [v2] hwrng: core: Fix missing check during driver release
- From: Aditya Pakki <pakki001@xxxxxxx>
- [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 3/4] KEYS: set correct flags for keyctl if encrypt is not supported
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 2/4] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 0/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 03/16] crypto: ofb - fix handling partial blocks and make thread-safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 10/16] crypto: keywrap - convert to skcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 05/16] crypto: skcipher - add helper for simple block cipher modes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 01/16] crypto: cfb - add missing 'chunksize' property
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/16] crypto: cfb - add missing 'chunksize' property
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: IPSec ESN: Packets decryption fail with ESN enabled connection
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Use after free in process_response_list()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 16/16] crypto: algapi - remove crypto_alloc_instance()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/16] crypto: ecb - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/16] crypto: ofb - convert to skcipher_alloc_instance_simple()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/16] crypto: pcbc - convert to skcipher_alloc_instance_simple()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/16] crypto: null - convert ecb-cipher_null to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/16] crypto: arc4 - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/16] crypto: pcbc - remove ability to wrap internal ciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/16] crypto: keywrap - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/16] crypto: pcbc - remove bogus memcpy()s with src == dest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/16] crypto: cbc - convert to skcipher_alloc_instance_simple()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/16] crypto: skcipher - add helper for simple block cipher modes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/16] crypto: cfb - convert to skcipher_alloc_instance_simple()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/16] crypto: ctr - convert to skcipher API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/16] crypto: cfb - add missing 'chunksize' property
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/16] crypto: ofb - fix handling partial blocks and make thread-safe
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/16] crypto: cfb - remove bogus memcpy() with src == dest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/16] crypto: skcipher template simplifications and conversions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: IPSec ESN: Packets decryption fail with ESN enabled connection
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH] crypto:authencesn: Avoid twice completion call in decrypt path
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: IPSec ESN: Packets decryption fail with ESN enabled connection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Bhupesh Sharma <bhsharma@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Vesa Jääskeläinen <dachaac@xxxxxxxxx>
- [PATCH] crypto: virtio: clean up indentation, replace spaces with tab
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: Fix typo in "pclmul"
- From: Huang nut <minhaco@xxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 -next] crypto: chelsio - remove set but not used variables 'adap'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] crypto: chelsio - CHECK-remove set but not used variables 'adap'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: chelsio - check set_msg_len overflow in generate_b0
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: chelsio - CHECK-remove set but not used variables 'adap'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: ux500 catch dma submission error
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] crypto: brcm - Fix some set-but-not-used warning
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v1 2/2] hwrng: add OP-TEE based rng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v1 1/2] dt/bindings: add bindings for optional optee rng-uuid property
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v1 0/2] Add OP-TEE based hwrng driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: Crypto Update for 4.21
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: hw_random: Fix missing check during driver release
- From: Michael Büsch <m@xxxxxxx>
- Re: [PATCH] char: hw_random: Fix missing check during driver release
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] char: hw_random: Fix missing check during driver release
- From: Aditya Pakki <pakki001@xxxxxxx>
- Re: Crypto Update for 4.21
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Crypto Update for 4.21
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IPSec ESN: Packets decryption fail with ESN enabled connection
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Ashish Mhetre <amhetre@xxxxxxxxxx>
- Re: [PATCH] crypto: remove remnants of internal IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Fix build with !CONFIG_DEBUG_FS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: salsa20-generic - don't unnecessarily use atomic walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - add might_sleep() to skcipher_walk_virt()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Added AEAD cipher support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxc-scc - fix build warnings on ARM64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: crypto_user_stat: remove unused dump functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto:chelsio: Bug Fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: chelsio - remove set but not used variable 'kctx_len'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - Use proper enum in hash_set_dma_transfer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] x86/crypto: gcmaes AVX scatter/gather support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - Use proper enum in cryp_set_dma_transfer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto4xx: add prng crypto support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 4/4] MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: hisilicon: Add queue management driver for HiSilicon QM module
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: hisilicon: Add HiSilicon ZIP accelerator support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 1/4] Documentation: Add debugfs doc for hisi_zip
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caam - add support for xcbc(aes)
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam - fix error reporting for caam_hash_alloc
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/3] crypto: caam - add support for xcbc(aes)
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/3] crypto: caam - create ahash shared descriptors only once
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: caam - fix SHA support detection
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix SHA support detection
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto: caam/qi2 - add a CRYPTO_DEV_FSL_CAAM dependency
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam/qi2 - add a CRYPTO_DEV_FSL_CAAM dependency
- From: Arnd Bergmann <arnd@xxxxxxxx>
- RFC: turris_mox secure firmware driver: should this be a crypto driver?
- From: Marek Behún <marek.behun@xxxxxx>
- Re: [PATCH] crypto: caam - fix zero-length buffer DMA mapping
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] crypto: caam - fix zero-length buffer DMA mapping
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto/ccp: Update copyright notices and dates
- From: "Hook, Gary" <Gary.Hook@xxxxxxx>
- Re: [PATCH v2] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH -next] crypto: chtls - remove set but not used variables 'err, adap, request, hws'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH 3/3] crypto: ccree - convert to use crypto_authenc_extractkeys()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: authenc - fix parsing key with misaligned rta_len
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/3] crypto: bcm - convert to use crypto_authenc_extractkeys()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: authenc - fix key parsing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove struct cipher_desc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove remnants of internal IV generators
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Fix build with !CONFIG_DEBUG_FS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: salsa20-generic - don't unnecessarily use atomic walk
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: skcipher - add might_sleep() to skcipher_walk_virt()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: BUG: sleeping function called from invalid context at mm/slab.h:LINE (4)
- From: syzbot <syzbot+9bf843c33f782d73ae7d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [tls 5/5] crypto/chelsio/chtls: send/recv window update
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [tls 4/5] crypto/chelsio/chtls: macro correction in tx path
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [tls 3/5] crypto/chelsio/chtls: listen fails with multiadapt
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [tls 2/5] net/tls: sleeping function from invalid context
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [tls 1/5] net/tls: Init routines in create_ctx
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/1] cavium: Update firmware for CNN55XX crypto driver
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Added AEAD cipher support
- From: Nagadheeraj Rottela <rnagadheeraj@xxxxxxxxxxx>
- Re: [PATCH v2] Allow hwrng to initialize crng.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH 2/2] scsi: ufs: add inline crypto support to UFS HCD
- From: Parshuram Raju Thombare <pthombar@xxxxxxxxxxx>
- Re: [PATCH v2] Allow hwrng to initialize crng.
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH 2/2] scsi: ufs: add inline crypto support to UFS HCD
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 2/2] scsi: ufs: add inline crypto support to UFS HCD
- From: Ladvine D Almeida <ladvine.dalmeida@xxxxxxxxxxxx>
- Re: [PATCH 2/2] scsi: ufs: add inline crypto support to UFS HCD
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 2/2] scsi: ufs: add inline crypto support to UFS HCD
- From: Ladvine D Almeida <ladvine.dalmeida@xxxxxxxxxxxx>
- Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH RFC 4/4] MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH RFC 2/4] crypto: hisilicon: Add queue management driver for HiSilicon QM module
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH RFC 3/4] crypto: hisilicon: Add HiSilicon ZIP accelerator support
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH RFC 0/4] crypto: hisilicon: Add HiSilicon QM and ZIP controller driver
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH RFC 1/4] Documentation: Add debugfs doc for hisi_zip
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: adiantum - fix leaking reference to hash algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - support incremental algorithm dumps
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: adiantum - adjust some comments to match latest paper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xchacha20 - fix comments for test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xchacha - add test vector from XChaCha20 draft RFC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] crypto: x86_64 optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: adiantum - propagate CRYPTO_ALG_ASYNC flag to instance
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: arm64/chacha - performance improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Enabled Mailbox support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: ARM64 NEON optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: <Tudor.Ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix setting IV after decrypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: mxc-scc - fix build warnings on ARM64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] Allow hwrng to initialize crng.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RESEND PATCH] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v2] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [RESEND PATCH] Allow hwrng to initialize crng.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RESEND PATCH] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH 2/2] crypto: document missing stats member
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 1/2] crypto: crypto_user_stat: remove unused dump functions
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v9 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Ashish Mhetre <amhetre@xxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Sagi Grimberg <sagi@xxxxxxxxxxx>
- Re: [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] scatterlist: Update size type to support greater then 4GB size.
- From: Ashish Mhetre <amhetre@xxxxxxxxxx>
- Re: [PATCH] fscrypt: remove CRYPTO_CTR dependency
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: ux500 - Use proper enum in hash_set_dma_transfer
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500 - Use proper enum in cryp_set_dma_transfer
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 6/6] crypto:chelsio: Fix wrong error counter increments
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 5/6] crypto:chelsio: Reset counters on cxgb4 Detach
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/6] crypto:chelsio: Swap location of AAD and IV sent in WR
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 4/6] Crypto:Chelsio:Handle PCI shutdown event
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/6] crypto:chelsio: cleanup:send addr as value in function argument
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/6] crypto:chelsio:Use same value for both channel in single WR
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 0/6] crypto:chelsio: Bug Fixes
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [tls 4/5] crypto/chelsio/chtls: macro correction in tx path
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [tls 5/5] crypto/chelsio/chtls: send/recv window update
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [tls 3/5] crypto/chelsio/chtls: listen fails with multiadapt
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [tls 2/5] net/tls: sleeping function from invalid context
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [tls 1/5] net/tls: Init routines in create_ctx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- BUG: using smp_processor_id() in preemptible [00000000] code
- From: "georgios.eleftheriou" <georgios.eleftheriou@xxxxxxxxxxxxxx>
- [PATCH -next] crypto: chelsio - remove set but not used variable 'kctx_len'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH] crypto/testmgr: fix skcipher test with CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] crypto/testmgr: fix skcipher test with CONFIG_VMAP_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ux500 - Use proper enum in hash_set_dma_transfer
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- [PATCH] crypto: ux500 - Use proper enum in cryp_set_dma_transfer
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- [PATCH 12/12] x86/crypto: aesni: Add scatter/gather avx stubs, and use them in C
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 10/12] x86/crypto: aesni: Introduce READ_PARTIAL_BLOCK macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 11/12] x86/crypto: aesni: Introduce partial block macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 07/12] x86/crypto: aesni: Merge avx precompute functions
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 09/12] x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 06/12] x86/crypto: aesni: Split AAD hash calculation to separate macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 08/12] x86/crypto: aesni: Fill in new context data structures
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 05/12] x86/crypto: aesni: Add GCM_COMPLETE macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 04/12] x86/crypto: aesni: support 256 byte keys in avx asm
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 03/12] x86/crypto: aesni: Macro-ify func save/restore
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 02/12] x86/crypto: aesni: Introduce gcm_context_data
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 01/12] x86/crypto: aesni: Merge GCM_ENC_DEC
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 00/12] x86/crypto: gcmaes AVX scatter/gather support
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH] crypto: adiantum - fix leaking reference to hash algorithm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix setting IV after decrypt
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] fscrypt: add Adiantum support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- PROBLEM: geode-aes not working with skcipher cbc
- From: Gert Robben <t2@xxxxxxx>
- [RFC PATCH] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] kbuild: move .SECONDARY special target to Kbuild.include
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/testmgr: fix skcipher test with CONFIG_VMAP_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto/testmgr: fix skcipher test with CONFIG_VMAP_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [cryptodev:master 81/86] htmldocs: include/linux/crypto.h:614: warning: Function parameter or member 'stats.aead' not described in 'crypto_alg'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: caam - fix setting IV after decrypt
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox convert to DEFINE_SHOW_ATTRIBUTE
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto chcr 1/2] small packet Tx stalls the queue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/11] crypto: crypto_user_stat: misc enhancement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: change NX/VMX maintainers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] new HW version and co-maintainer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/11] crypto: crypto_user_stat: misc enhancement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: user - support incremental algorithm dumps
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: adiantum - adjust some comments to match latest paper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: xchacha20 - fix comments for test vectors
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: xchacha - add test vector from XChaCha20 draft RFC
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: Implement a generic crypto statistics
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] dm crypt: log the encryption algorithm implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] dm verity: log the hash algorithm implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] dm verity: log the hash algorithm implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] dm crypt: log the encryption algorithm implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: Implement a generic crypto statistics
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/6] crypto: x86/nhpoly1305 - add SSE2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 2/6] crypto: x86/nhpoly1305 - add AVX2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 5/6] crypto: x86/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/6] crypto: x86/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 6/6] crypto: x86/chacha - yield the FPU occasionally
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/6] crypto: x86/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/6] crypto: x86_64 optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto: x86/chacha20 - limit the preemption-disabled section
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 4/6] crypto: x86/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Using Advanced Vector eXtensions with hand-coded x64 algorithms (e.g /arch/x86/blowfish-x86_64-asm_64.S)
- From: Shipof _ <shipof123main@xxxxxxxxx>
- [PATCH] crypto: adiantum - propagate CRYPTO_ALG_ASYNC flag to instance
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fscrypt: remove CRYPTO_CTR dependency
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [tip:core/rcu] crypto/pcrypt: Replace synchronize_rcu_bh() with synchronize_rcu()
- From: "tip-bot for Paul E. McKenney" <tipbot@xxxxxxxxx>
- Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: arm64/chacha20 - add XChaCha20 support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: arm64/chacha - use combined SIMD/ALU routine for more speed
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: arm64/chacha - optimize for arbitrary length inputs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: tcrypt - add block size of 1472 to skcipher template
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] crypto: arm64/chacha - performance improvements
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Enabled Mailbox support
- From: "Srikanth, Jampala" <Jampala.Srikanth@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/4] crypto: arm64/nhpoly1305 - add NEON-accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: arm64/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: arm64/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: arm64/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: ARM64 NEON optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto: x86/chacha20 - limit the preemption-disabled section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 7/7] lib/lzo: separate lzo-rle from lzo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] lib/lzo: separate lzo-rle from lzo
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [RFC/RFT PATCH] crypto: arm64/chacha - optimize for arbitrary length inputs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto: x86/chacha20 - limit the preemption-disabled section
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/chacha - add XChaCha12 support
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] crypto: x86/chacha20 - refactor to allow varying number of rounds
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] crypto: x86/chacha20 - add XChaCha20 support
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox convert to DEFINE_SHOW_ATTRIBUTE
- From: Yangtao Li <tiny.windzz@xxxxxxxxx>
- Re: [PATCH v5 00/11] crypto: crypto_user_stat: misc enhancement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] kbuild: move .SECONDARY special target to Kbuild.include
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [RFC/RFT PATCH] crypto: arm64/chacha - optimize for arbitrary length inputs
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 00/14] crypto: Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v24 1/6] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 6/6] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 4/6] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 0/6] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 2/6] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v24 5/6] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: arm64/chacha - add XChaCha12 support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: arm64/chacha20 - refactor to allow varying number of rounds
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: arm64/chacha20 - add XChaCha20 support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: arm64/nhpoly1305 - add NEON-accelerated NHPoly1305
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [crypto chcr 2/2] ESN for Inline IPSec Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto chcr 1/2] small packet Tx stalls the queue
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 2/6] crypto: x86/nhpoly1305 - add AVX2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/6] crypto: x86/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: x86/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: x86/chacha20 - limit the preemption-disabled section
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/6] crypto: x86/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: x86/nhpoly1305 - add SSE2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/6] crypto: x86_64 optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 04/14] integrity: Introduce struct evm_xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/11] crypto: crypto_user_stat: misc enhancement
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v5 07/11] crypto: crypto_user_stat: Fix invalid stat reporting
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 06/11] crypto: crypto_user_stat: fix use_after_free of struct xxx_request
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 09/11] crypto: crypto_user_stat: Split stats in multiple structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 10/11] crypto: crypto_user_stat: rename err_cnt parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 11/11] crypto: crypto_user_stat: Add crypto_stats_init
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 08/11] crypto: crypto_user_stat: remove intermediate variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 05/11] crypto: tool: getstat: convert user space example to the new crypto_user_stat uapi
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 03/11] crypto: crypto_user_stat: convert all stats from u32 to u64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 04/11] crypto: crypto_user_stat: split user space crypto stat structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 01/11] crypto: crypto_user_stat: made crypto_user_stat optional
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 00/11] crypto: crypto_user_stat: misc enhancement
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v5 02/11] crypto: CRYPTO_STATS should depend on CRYPTO_USER
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: cavium/nitrox - Enable interrups for PF in SR-IOV mode.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: cavium/nitrox - crypto request format changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86/chacha20 - AVX-512VL block functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: use memzero_explicit instead of memset to clear contexts.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: PanBian <bianpan2016@xxxxxxx>
- Re: [PATCH] crypto: use memzero_explicit instead of memset to clear contexts.
- From: David CARLIER <devnexen@xxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: use memzero_explicit instead of memset to clear contexts.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Help] Null pointer exception in scatterwalk_start() in kernel-4.9
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: arm64/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/4] crypto: arm64/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/4] crypto: arm64/nhpoly1305 - add NEON-accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/4] crypto: arm64/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/4] crypto: ARM64 NEON optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 06/11] crypto: crypto_user_stat: fix use_after_free of struct xxx_request
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: use memzero_explicit instead of memset to clear contexts.
- From: David CARLIER <devnexen@xxxxxxxxx>
- Re: KMSAN: uninit-value in gf128mul_4k_lle (3)
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 1/6] crypto: x86/nhpoly1305 - add SSE2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/6] crypto: x86/chacha20 - limit the preemption-disabled section
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/6] crypto: x86/nhpoly1305 - add AVX2 accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/6] crypto: x86/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/6] crypto: x86/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/6] crypto: x86/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/6] crypto: x86_64 optimized XChaCha and NHPoly1305 (for Adiantum)
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] MAINTAINERS: change NX/VMX maintainers
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH tip/core/rcu 09/41] crypto/pcrypt: Replace synchronize_rcu_bh() with synchronize_rcu()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- [PATCH v4] fscrypt: add Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: KMSAN: uninit-value in gf128mul_4k_lle (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- KMSAN: uninit-value in gf128mul_4k_lle (3)
- From: syzbot <syzbot+f8495bff23a879a6d0bd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] cxgb4: use new fw interface to get the VIN and smt index
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/11] crypto: crypto_user_stat: misc enhancement
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v4 04/11] crypto: crypto_user_stat: split user space crypto stat structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 02/11] crypto: CRYPTO_STATS should depend on CRYPTO_USER
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 01/11] crypto: crypto_user_stat: made crypto_user_stat optional
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 03/11] crypto: crypto_user_stat: convert all stats from u32 to u64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 06/11] crypto: crypto_user_stat: fix use_after_free of struct xxx_request
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 08/11] crypto: crypto_user_stat: remove intermediate variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 07/11] crypto: crypto_user_stat: Fix invalid stat reporting
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 10/11] crypto: crypto_user_stat: rename err_cnt parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 11/11] crypto: crypto_user_stat: Add crypto_stats_init
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 09/11] crypto: crypto_user_stat: Split stats in multiple structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 05/11] crypto: tool: getstat: convert user space example to the new crypto_user_stat uapi
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v4 00/11] crypto: crypto_user_stat: misc enhancement
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: PanBian <bianpan2016@xxxxxxx>
- [PATCH AUTOSEL 4.14 06/21] crypto: simd - correctly take reqsize of wrapped skcipher into account
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 14/36] crypto: simd - correctly take reqsize of wrapped skcipher into account
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH net-next] cxgb4: use new fw interface to get the VIN and smt index
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH net-next] cxgb4: use new fw interface to get the VIN and smt index
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: do not free algorithm before using
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: do not free algorithm before using
- From: Pan Bian <bianpan2016@xxxxxxx>
- [PATCH 1/1] cavium: Update firmware for CNN55XX crypto driver
- From: "Nagadheeraj, Rottela" <Rottela.Nagadheeraj@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH net-next] cxgb4: use new fw interface to get the VIN and smt index
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 1/1] crypto: cavium/nitrox - Enable interrups for PF in SR-IOV mode.
- From: "Srikanth, Jampala" <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH net-next] cxgb4: use new fw interface to get the VIN and smt index
- From: Ganesh Goudar <ganeshgr@xxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: cavium/nitrox - crypto request format changes
- From: "Nagadheeraj, Rottela" <Rottela.Nagadheeraj@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 3/3] crypto: x86/chacha20 - Add a 4-block AVX-512VL variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: x86/chacha20 - Add a 8-block AVX-512VL variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: x86/chacha20 - Add a 2-block AVX-512VL variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: x86/chacha20 - AVX-512VL block functions
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] crypto: crypto_user_stat: made crypto_user_stat optional
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH v3 02/10] crypto: CRYPTO_STATS should depend on CRYPTO_USER
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 03/10] crypto: crypto_user_stat: convert all stats from u32 to u64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 04/10] crypto: crypto_user_stat: split user space crypto stat structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 01/10] crypto: crypto_user_stat: made crypto_user_stat optional
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 06/10] crypto: crypto_user_stat: fix use_after_free of struct xxx_request
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 09/10] crypto: crypto_user_stat: Split stats in multiple structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 10/10] crypto: crypto_user_stat: rename err_cnt parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 08/10] crypto: crypto_user_stat: remove intermediate variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 07/10] crypto: crypto_user_stat: Fix invalid stat reporting
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 05/10] crypto: tool: getstat: convert user space example to the new crypto_user_stat uapi
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v3 00/10] crypto: crypto_user_stat: misc enhancement
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- Re: Guidance required for a crypto requirement
- From: "gregkh@xxxxxxxxxxxxxxxxxxx" <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [Help] Null pointer exception in scatterwalk_start() in kernel-4.9
- From: "gongchen (E)" <gongchen4@xxxxxxxxxx>
- Re: [PATCH v4 00/14] crypto: Adiantum support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drop mask=CRYPTO_ALG_ASYNC from 'shash' tfm allocations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: drop mask=CRYPTO_ALG_ASYNC from 'cipher' tfm allocations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove useless initializations of cra_list
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - remove useless setting of type flags
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 4/4] zinc: ChaCha20 x86_64 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 2/4] zinc: ChaCha20 generic C implementation and selftest
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 3/4] zinc: Add x86 accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 1/4] crypto: chacha20 - Export chacha20 functions without crypto API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 0/4] Exporting existing crypto API code through zinc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: move crypto_alg_get/crypto_alg_put to linux/crypto.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: move crypto_alg_get/crypto_alg_put to linux/crypto.h
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 01/11] crypto: move crypto_alg_get/crypto_alg_put to linux/crypto.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 00/12] crypto: Adiantum support
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: move crypto_alg_get/crypto_alg_put to linux/crypto.h
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 00/12] crypto: Adiantum support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v2 03/11] crypto: CRYPTO_STATS should depend on CRYPTO_USER
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 04/11] crypto: crypto_user_stat: convert all stats from u32 to u64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 05/11] crypto: crypto_user_stat: split user space crypto stat structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 02/11] crypto: crypto_user_stat: made crypto_user_stat optional
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 07/11] crypto: crypto_user_stat: fix use_after_free of struct xxx_request
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 09/11] crypto: crypto_user_stat: remove intermediate variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: crypto_user_stat: Split stats in multiple structures
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: crypto_user_stat: rename err_cnt parameter
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 08/11] crypto: crypto_user_stat: Fix invalid stat reporting
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 06/11] crypto: tool: getstat: convert user space example to the new crypto_user_stat uapi
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 01/11] crypto: move crypto_alg_get/crypto_alg_put to linux/crypto.h
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH v2 00/11] crypto: crypto_user_stat: misc enhancement
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/12] crypto: Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [RFC PATCH] zinc chacha20 generic implementation using crypto API code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- BUG: unable to handle kernel paging request in aead_geniv_alloc
- From: syzbot <syzbot+cd50d1708db841432d8a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 10/15] crypto: poly1305 - use structures for key and accumulator
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: update bindings for MT7629 SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/12] crypto: Adiantum support
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] HID: add driver for U2F Zero built-in LED and RNG
- From: Nick Kossifidis <mickflemm@xxxxxxxxx>
- Re: [PATCH] HID: add driver for U2F Zero built-in LED and RNG
- From: Nick Kossifidis <mickflemm@xxxxxxxxx>
- Re: [PATCH v4 14/14] crypto: adiantum - add Adiantum support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 13/14] crypto: arm/nhpoly1305 - add NEON-accelerated NHPoly1305
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 12/14] crypto: nhpoly1305 - add NHPoly1305 support
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 11/14] crypto: poly1305 - add Poly1305 core API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 10/14] crypto: poly1305 - use structures for key and accumulator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 00/14] crypto: Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/14] crypto: chacha20-generic - add HChaCha20 library function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 02/14] crypto: chacha20-generic - don't unnecessarily use atomic walk
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 07/14] crypto: arm/chacha20 - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 05/14] crypto: chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 11/14] crypto: poly1305 - add Poly1305 core API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 10/14] crypto: poly1305 - use structures for key and accumulator
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 09/14] crypto: arm/chacha - add XChaCha12 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 03/14] crypto: chacha20-generic - add XChaCha20 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 13/14] crypto: arm/nhpoly1305 - add NEON-accelerated NHPoly1305
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 14/14] crypto: adiantum - add Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 12/14] crypto: nhpoly1305 - add NHPoly1305 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/14] crypto: chacha20-generic - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 08/14] crypto: arm/chacha20 - refactor to allow varying number of rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 06/14] crypto: arm/chacha20 - limit the preemption-disabled section
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v3 10/15] crypto: poly1305 - use structures for key and accumulator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v3 10/15] crypto: poly1305 - use structures for key and accumulator
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: update bindings for MT7629 SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH v2 00/12] crypto: Adiantum support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v8 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Crypto Fixes for 4.20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ecc - regularize scalar for scalar multiplication
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: caam - add support for Era 10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND 0/2] Port mxs-dcp to imx6ull and imx6sll
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: update bindings for MT7629 SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm/crypto/aes-ce-glue.c: Remove duplicate header
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] crypto: streebog - add Streebog hash function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bcm: fix normal/non key hash algorithm failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cts: document NIST standard status
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - check for invalid values in the key verification test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 10/15] crypto: poly1305 - use structures for key and accumulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH tip/core/rcu 09/41] crypto/pcrypt: Replace synchronize_rcu_bh() with synchronize_rcu()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: rng: update bindings for MT7629 SoC
- From: Sean Wang <sean.wang@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - remove useless setting of type flags
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: drop mask=CRYPTO_ALG_ASYNC from 'shash' tfm allocations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: drop mask=CRYPTO_ALG_ASYNC from 'cipher' tfm allocations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: remove useless initializations of cra_list
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: inside-secure - remove useless setting of type flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [PATCH] HID: add driver for U2F Zero built-in LED and RNG
- From: Andrej Shadura <andrew.shadura@xxxxxxxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [PATCH 3/3] MAINTAINERS: ccree: add co-maintainer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/3] dt-bindings: crypto: ccree: add dt bindings for ccree 703
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: ccree: add support for CryptoCell 703
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] new HW version and co-maintainer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [Qestion] Lots of memory leaks when mounting and unmounting nfs client to server continuously.
- From: zhong jiang <zhongjiang@xxxxxxxxxx>
- Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH net-next v6 23/23] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v6 23/23] net: WireGuard secure network tunnel
- From: Dave Taht <dave.taht@xxxxxxxxx>
- Re: [PATCH net-next v6 23/23] net: WireGuard secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH v3 10/15] crypto: poly1305 - use structures for key and accumulator
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 05/12] PGPLIB: Signature parser
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 04/12] PGPLIB: Basic packet parser
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] HID: add driver for U2F Zero built-in LED and RNG
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [RFC][PATCH 11/12] KEYS: Provide a function to load keys from a PGP keyring blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 12/12] KEYS: Introduce load_pgp_public_keyring()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 10/12] PGP: Provide a key type for testing PGP signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 09/12] verification: introduce verify_pgp_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 07/12] KEYS: Provide PGP key description autogeneration
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 06/12] KEYS: PGP data parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 05/12] PGPLIB: Signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 04/12] PGPLIB: Basic packet parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 03/12] PGPLIB: PGP definitions (RFC 4880)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 02/12] rsa: add parser of raw format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 01/12] mpi: introduce mpi_key_length()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 00/12] keys: add support for PGP keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Something wrong with cryptodev-2.6 tree?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFCv3 PATCH 6/6] uacce: add user sample for uacce/warpdrive
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 5/6] crypto: add uacce support to Hisilicon qm
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 4/6] crypto/hisilicon: add Hisilicon zip driver
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 3/6] crypto/hisilicon: add hisilicon Queue Manager driver
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 2/6] uacce: add uacce module
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFCv3 PATCH 0/6] A General Accelerator Framework, WarpDrive
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- Something wrong with cryptodev-2.6 tree?
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH tip/core/rcu 09/41] crypto/pcrypt: Replace synchronize_rcu_bh() with synchronize_rcu()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH v2] crypto: ecc - regularize scalar for scalar multiplication
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 03/17] hw_random: bcm2835-rng: Switch to SPDX identifier
- From: Lubomir Rintel <lkundrak@xxxxx>
- [PATCH 6/6] crypto: x86/chacha20 - Add a 4-block AVX2 variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: x86/chacha20 - Support partial lengths in 4-block SSSE3 variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 5/6] crypto: x86/chacha20 - Add a 2-block AVX2 variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: x86/chacha20 - SIMD performance improvements
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: x86/chacha20 - Support partial lengths in 1-block SSSE3 variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: x86/chacha20 - Support partial lengths in 8-block AVX2 variant
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: x86/chacha20 - Use larger block functions more aggressively
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 03/17] hw_random: bcm2835-rng: Switch to SPDX identifier
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH 03/17] hw_random: bcm2835-rng: Switch to SPDX identifier
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/17] hw_random: bcm2835-rng: Switch to SPDX identifier
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH 00/17] bcm2835: Treewide switch to SPDX identifier
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH] padata: clean an indentation issue, remove extraneous space
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- How driver can mark the algo implementation Unavailable
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] crypto: mark cts(cbc(aes)) as FIPS allowed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: clean up various indentation issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] pcrypt: use format specifier in kobject_add
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: fix cfb mode decryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - fix a DMA pool free failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: ccree: add SM3 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: ccree: add CryptoCell 713 baseline support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: some hardening against AES cache-timing attacks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: crypto_user reporting fixes and cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/simd: correctly take reqsize of wrapped skcipher into account
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto/simd: correctly take reqsize of wrapped skcipher into account
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/simd: correctly take reqsize of wrapped skcipher into account
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon - A couple of fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: .S_shipped unnecessary?
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]