Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH v2 net-next 0/6] TLS Rx
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - Document remaining members in struct crypto_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 19/47] crypto: remove blackfin CRC driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Keystone2 HW random generator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure: improve clock management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ctr - avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- Re: [PATCH] omap-aes - fix crypto cleanup and IV reporting
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Vaneet Narang <v.narang@xxxxxxxxxxx>
- [RFC PATCH v5 2/5] crypto: add zBeWalgo to crypto-api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 4/5] crypto: configurable compression level
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 3/5] crypto: add unsafe decompression to api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 0/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 1/5] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 5/5] crypto: add flag for unstable encoding
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 9/9] crypto: talitos - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 8/9] crypto: qat - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 7/9] crypto: picoxcell - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 5/9] crypto: chcr - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 2/9] crypto: authencesn - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 0/9] crypto: don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] crypto: zbewalgo_stat_combination[] can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: lrw - Free rctx->ext with kzfree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- [PATCH v14 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 00/10] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 03/10] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v14 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 net-next 5/6] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 6/6] tls: Add receive path documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 3/6] tls: Pass error code explicitly to tls_err_abort
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 1/6] tls: Generalize zerocopy_from_iter
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 0/6] TLS Rx
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 4/6] tls: Refactor variable names
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 2/6] tls: Move cipher info to a separate struct
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH 0/9] don't leak pointers to authenc keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] omap-aes - fix crypto cleanup and IV reporting
- From: Francis Le Bourse <francis.lebourse@xxxxxx>
- [PATCH] omap-crypto - fix kernel oops and output buffer update
- From: Francis Le Bourse <francis.lebourse@xxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH v2] crypto: talitos - fix IPsec cipher in length
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] crypto: Add zstd support
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RESEND PATCH] crypto: Add zstd support
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Nick Terrell <terrelln@xxxxxx>
- Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- [PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 8/9] crypto: qat - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 5/9] crypto: chcr - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 4/9] crypto: caam/qi - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/9] crypto: caam - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/9] crypto: authencesn - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/9] don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/9] crypto: authenc - don't leak pointers to authenc keys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v13 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 02/10] iomap: Fix sparse endian check warnings
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 03/10] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [RFC] SHASH_DESC_ON_STACK macro
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH net-next 5/6] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH net-next 5/6] tls: RX path for ktls
- From: Boris Pismenny <borisp@xxxxxxxxxxxx>
- [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
- From: Maninder Singh <maninder1.s@xxxxxxxxxxx>
- Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH net-next 4/6] tls: Refactor variable names
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 6/6] tls: Add receive path documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 5/6] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 3/6] tls: Pass error code explicitly to tls_err_abort
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 1/6] tls: Generalize zerocopy_from_iter
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 2/6] tls: Move cipher info to a separate struct
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 0/6] TLS Rx
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] tls: create_ctx() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 5/5 v4] crypto: add flag for unstable encoding
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/5 v4] crypto: add unsafe decompression to api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5 v4] crypto: configurable compression level
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5 v4] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5 v4] add compression algorithm zBeWalgo
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- crypto: api - Keep failed instances alive
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: api - Make crypto_alg_lookup static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: api - Remove unused crypto_type lookup function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v12 net-next 00/12] Chelsio Inline TLS
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 11/12] crypto: chtls - Register chtls with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 07/12] crypto: chtls - Program the TLS session Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 04/12] cxgb4: LLD driver changes to support TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 05/12] crypto: chcr - Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 03/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v12 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/9] crypto: inside-secure - improve the skcipher token
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 4/9] crypto: inside-secure - improve the send error path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 3/9] crypto: inside-secure - fix a typo in a register name
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 5/9] crypto: inside-secure - do not access buffers mapped to the device
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 7/9] crypto: inside-secure - the context ipad/opad should use the state sz
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 9/9] crypto: inside-secure - hmac(sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 2/9] crypto: inside-secure - fix typo s/allways/always/ in a define
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 8/9] crypto: inside-secure - hmac(sha256) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 1/9] crypto: inside-secure - move the digest to the request context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- RE: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
- From: Madalin-cristian Bucur <madalin.bucur@xxxxxxx>
- Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
- From: Matias Bjørling <mb@xxxxxxxxxxx>
- Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v11 crypto 01/12] tls: support for Inline tls record (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- RE: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 11/12] crypto: inside-secure - hmac(sha256) support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 04/12] ima: Introduce is_ima_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/12] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 11/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 12/12] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 10/12] ima: Add functions to read and verify a modsig signature
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 08/12] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: x86/des3_ede: make array des3_ede_skciphers static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 01/12] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 03/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 04/12] cxgb4: LLD driver changes to support TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 05/12] crypto: chcr - Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 07/12] crypto: chtls - Program the TLS session Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 08/12] crypto : chtls - CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 10/12] crypto: chtls - Inline TLS record Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 09/12] crypto: chtls - Inline TLS record Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v11 crypto 11/12] crypto: chtls - Register chtls with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio - remove dependency on CRYPTO_AUTHENC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: Validate buffer lengths for copy operations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hash.h: Prevent use of req->result in ahash update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: introduce SM4 symmetric cipher algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 8/9] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 9/9] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 6/9] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 0/9] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 3/9] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 2/9] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 1/9] iomap: Fix sparse endian check warnings
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 5/9] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 4/9] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v12 7/9] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 04/21] fbdev: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 01/21] ASoC: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 16/21] remoteproc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 03/21] crypto: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 00/21] Allow compile-testing NO_DMA (drivers)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/21] iio: adc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 07/21] i2c: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
- From: John Garry <john.garry@xxxxxxxxxx>
- [PATCH v2 09/21] iommu: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 13/21] mmc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 02/21] ata: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 05/21] firewire: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 19/21] spi: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 12/21] media: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 06/21] fpga: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 20/21] staging: vc04_services: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 14/21] mtd: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 11/21] mailbox: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 15/21] net: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 21/21] usb: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 18/21] serial: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [bug report] crypto: omap-aes - Add support for GCM mode
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/12] crypto: inside-secure - move cache result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/12] crypto: inside-secure - wait for the request to complete if in the backlog
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/12] crypto: inside-secure - fix typo s/allways/always/ in a define
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/12] crypto: inside-secure - fix a typo in a register name
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/12] crypto: inside-secure - do not access buffers mapped to the device
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/12] crypto: inside-secure - improve the skcipher token
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/12] crypto: inside-secure - the context ipad/opad should use the state sz
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/12] crypto: inside-secure - hmac(sha256) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/12] crypto: inside-secure - move the digest to the request context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/12] crypto: inside-secure - hmac(sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/12] crypto: inside-secure - improve the send error path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/12] crypto: inside-secure - move hash result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: kbuild test robot <lkp@xxxxxxxxx>
- RE: [PATCH] crypto: ctr: avoid VLA use
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v2] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/47] arch-removal: device drivers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- [PATCH] crypto: doc - Document remaining members in struct crypto_alg
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 19/47] crypto: remove blackfin CRC driver
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/47] arch-removal: device drivers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: add bindings doc for Keystone SA HWRNG driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH v2 0/2] Keystone2 HW random generator
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH v2 2/2] hw_random: keystone2: add hw_random driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 2/3] crypto: inside-secure - improve clock initialization
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - fix clock resource by adding a register clock
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - fix clock management
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure: improve clock management
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [EXTERNAL] Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- in-kernel user of ecdsa
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Vitaly Andrianov <vitalya@xxxxxx>
- Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/talitos: Adjustments for talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 crypto 07/11] chtls: Program the TLS Key
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v10 crypto 08/11] chtls: CPL handler definition
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v10 crypto 09/11] chtls: Inline TLS request Tx/Rx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v3 6/6] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] trusted keys: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/6] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 23/23] DO NOT MERGE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 22/23] crypto: arm64/sm3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 21/23] crypto: arm64/sha512-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 20/23] crypto: arm64/sha3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 19/23] crypto: arm64/crct10dif-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 18/23] crypto: arm64/crc32-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 17/23] crypto: arm64/aes-ghash - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 16/23] crypto: arm64/aes-bs - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 15/23] crypto: arm64/aes-blk - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 14/23] crypto: arm64/aes-ccm - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 12/23] crypto: arm64/sha1-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 13/23] crypto: arm64/sha2-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 11/23] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 10/23] arm64: assembler: add utility macros to push/pop stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 09/23] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 08/23] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 07/23] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 06/23] crypto: arm64/aes-blk - remove configurable interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 05/23] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 04/23] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 03/23] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 01/23] crypto: testmgr - add a new test case for CRC-T10DIF
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 02/23] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v10 crypto 10/11] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 11/11] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 09/11] chtls: Inline TLS request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 08/11] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 03/11] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 07/11] chtls: Program the TLS Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 06/11] chcr: Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 05/11] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 04/11] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 02/11] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 01/11] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 00/11] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: Validate buffer lengths for copy operations
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp - Fill the result buffer only on digest, finup, and final ops
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] add crypto support for TPM communication
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto:Chelsio: no csum offload for ipsec path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: omap: Fix clock resource for Armada 7K/8K
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: talitos - do not perform unnecessary dma synchronisation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: omap: fixes + tweaks for omap crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cavium: make two functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - fixes for heavy load usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH RFC 4/5] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/5] tls: RX path for ktls
- From: Boris Pismenny <borisp@xxxxxxxxxxxx>
- [PATCH RFC 4/5] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 5/5] tls: Add receive path documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 1/5] tls: Generalize zerocopy_from_iter
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 3/5] tls: Pass error code explicitly to tls_err_abort
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 2/5] tls: Move cipher info to a separate struct
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 0/5] TLX Rx
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v9 crypto 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC v2 5/5] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 4/5] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 3/5] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 2/5] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 1/5] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/5] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Paul Cercueil <paul@xxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/ccp - Fill the result buffer only on digest, finup, and final ops
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto/ccp: Validate buffer lengths for copy operations
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v9 crypto 08/12] chtls: Key program
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: hash.h: Prevent use of req->result in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- [PATCH] crypto: virtio - remove dependency on CRYPTO_AUTHENC
- From: Peter Wu <peter@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Paul Cercueil <paul@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- RE: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- RE: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 2/2] crypto: introduce SM4 testmgr tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: introduce SM4 symmetric cipher algorithm
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: introduce SM4 symmetric cipher algorithm
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: James Hogan <jhogan@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: chelsio - Cleanup and bug fixes
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 5/5] crypto:chelsio:Split Hash requests for large scatter gather list
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 4/5] crypto:chelsio: Fix iv passed in fallback path for rfc3686
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 3/5] crypto:chelsio: Update IV before sending request to HW
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 1/5] crypto:chelsio: Use kernel round function to align lengths
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 2/5] crypto:chelsio: Fix src buffer dma length
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH 1/2] Documentation: dt: rng: add bindings doc for Keystone SA HWRNG driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Document Freescale i.MX21 and i.MX31 RNGA compatibles
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: Document Freescale i.MX21 and i.MX31 RNGA compatibles
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH v2 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document Freescale i.MX31 RNGA compatible
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: Gary R Hook <gary.hook@xxxxxxx>
- [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v11 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 2/7] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 1/7] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC 0/2] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/2] add integrity and security to TPM2 transactions
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH][next] crypto: x86/des3_ede: make array des3_ede_skciphers static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: omap-sham - Fix misleading indentation
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [crypto v8 04/12] chtls: structure and macro definiton
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/2] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- [cryptodev:master 109/128] arch/x86/crypto/des3_ede_glue.c:407:21: sparse: symbol 'des3_ede_skciphers' was not declared. Should it be static?
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] fscrypt: add Speck128/256 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 17/18] crypto: talitos - chain in buffered data for ahash on SEC1
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 17/18] crypto: talitos - chain in buffered data for ahash on SEC1
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Enable CAAM on i.MX7s fix TrustZone issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/30] crypto: x86 glue code cleanup/conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] cleanups and new HW rev support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Clean up redundant #include
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 4.4 12/34] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 24/56] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 050/115] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ecdh: fix to allow multi segment scatterlists
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: cfb: add support for Cipher FeedBack mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] add crypto support for TPM communication
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 2/4] crypto: omap-sham - Fix misleading indentation
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 4/4] crypto: s5p-sss - Constify pointed data (arguments and local variables)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 3/4] crypto: s5p-sss: Remove useless check for non-null request
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 0/2] Keystone2 HW random generator
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 2/2] hw_random: keystone2: add hw_random driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 1/2] Documentation: dt: rng: add bindings doc for Keystone SA HWRNG driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [crypto v8 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - protect RSA implementation from too large input data
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] Crypto:Chelsio: no csum offload for ipsec path
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 4/5] KEYS: add asymmetric kpp subtype
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 3/5] KEYS: Provide missing asym kpp subops for new key type ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 2/5] KEYS: Provide keyctls to drive the new key type ops for kpp
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: omap - Fix clock resource by adding a register clock
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 1/2] hwrng: omap - Remove useless test before clk_disable_unprepare
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 0/2] hwrng: omap: Fix clock resource for Armada 7K/8K
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH v4 4/4] ARM: dts: imx7s: add CAAM device node
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- [PATCH 1/4] crypto: bcm: Remove unused variable (char *tag_to_hash_idx[])
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: bcm: Move *aead_alg_name[] from spu.c to util.c. Constify too.
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: bcm: Constify variables in spu2.c
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Gary R Hook <gary.hook@xxxxxxx>
- Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 3/6] crypto: omap-sham: make fallback size configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 6/6] crypto: omap-aes: make queue length configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 5/6] crypto: omap-aes: make fallback size configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 4/6] crypto: omap-sham: make queue length configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 1/6] crypto: omap-sham: Verify page zone of scatterlists before starting DMA
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 2/6] crypto: omap-crypto: Verify page zone scatterlists before starting DMA
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 0/6] crypto: omap: fixes + tweaks for omap crypto
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 1/2] dt-bindings: rng: Document Freescale i.MX31 RNGA compatible
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 2/2] crypto: talitos - do not perform unnecessary dma synchronisation
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] hwrng: cavium: make two functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: ahash - scheduling whilst atomic.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- ahash - scheduling whilst atomic.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - wait for the request to complete if in the backlog
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - fixes for heavy load usage
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - move hash result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - move cache result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: "Hook, Gary" <ghook@xxxxxxx>
- [PATCH 5/5] crypto:chelsio:Split Hash requests for large scatter gather list
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 4/5] crypto:chelsio: Fix iv passed in fallback path for rfc3686
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/5] crypto:chelsio: Update IV before sending request to HW
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/5] crypto:chelsio: Fix src buffer dma length
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/5] crypto:chelsio: Use kernel round function to align lengths
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - protect RSA implementation from too large input data
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [dm-devel] Integrity checking fails with Atmel SHA hw accelerator enabled
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: SVM: kbuild test robot warning fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [Crypto v7 03/12] tls: support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- RE: [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [Crypto v7 03/12] tls: support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [Crypto v7 00/12] Chelsio Inline TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] Remove useless assignment in rsa_verify
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable 1/2] crypto: hash - annotate algorithms taking optional key
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH -stable 2/2] crypto: hash - prevent using keyed hashes without setting key
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH -stable 1/2] crypto: hash - annotate algorithms taking optional key
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [Crypto v7 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix memdup.cocci warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: bcm: Delete an error message for a failed memory allocation in do_shash()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bfin_crc: Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]