Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: bfin_crc: Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] x86/crypto gcmaes SSE scatter/gather support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: Speck support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Remove useless assignment in rsa_verify
- From: C0deAi <techsupport@xxxxxxxxx>
- Re: [PATCH 0/2] crypto/sahara: Adjustments for sahara_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Ux500 crypto: Adjustments for ux500_cryp_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: inside-secure - stabilization and fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: Handle deferred clock properly
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: sunxi-ss: Add MODULE_ALIAS to sun4i-ss
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 2/4] crypto: caam - do not use mem and emi_slow clock for imx7x
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [Crypto v7 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 3/4] clk: imx7d: add CAAM clock
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- [Crypto v7 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 4/4] ARM: dts: imx7s: add CAAM device node
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: caam - Fix null dereference at error path
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [PATCH v4 0/4] Enable CAAM on i.MX7s fix TrustZone issues
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Alexandre Torgue <alexandre.torgue@xxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 2/2] include: psp-sev: Capitalize invalid length enum
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- RE: [Crypto v6 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [Crypto v6 03/12] tls: support for inline tls
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 30/30] crypto: ablk_helper - remove ablk_helper
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 23/30] crypto: x86/camellia - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 24/30] crypto: x86/camellia - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 29/30] crypto: x86/glue_helper - rename glue_skwalk_fpu_begin()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 25/30] crypto: x86/camellia-aesni-avx,avx2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 26/30] crypto: xts - remove xts_crypt()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 28/30] crypto: x86/glue_helper - remove blkcipher_walk functions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 27/30] crypto: lrw - remove lrw_crypt()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 22/30] crypto: x86/camellia - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 21/30] crypto: x86/camellia-aesni-avx2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 15/30] crypto: x86/cast5-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 16/30] crypto: x86/cast6-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 17/30] crypto: x86/cast6-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 20/30] crypto: x86/camellia-aesni-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 19/30] crypto: x86/des3_ede - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 18/30] crypto: x86/blowfish: convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 12/30] crypto: x86/twofish-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 13/30] crypto: x86/twofish-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 14/30] crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 11/30] crypto: x86/twofish-3way - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 10/30] crypto: x86/twofish-3way - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 06/30] crypto: x86/serpent-avx2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 09/30] crypto: x86/twofish-3way - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 08/30] crypto: x86/serpent-avx,avx2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 07/30] crypto: x86/serpent-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 05/30] crypto: x86/serpent-sse2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 04/30] crypto: x86/serpent-sse2 - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 03/30] crypto: x86/serpent-sse2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 02/30] crypto: x86/glue_helper - add skcipher_walk functions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 01/30] crypto: simd - allow registering multiple algorithms at once
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 00/30] crypto: x86 glue code cleanup/conversion
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 2/4] dt-bindings: Add DT bindings for ccree 710 and 630p
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 0/4] cleanups and new HW rev support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: remove unused definitions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/4] dt-bindings: Add DT bindings for ccree 710 and 630p
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: add support for older HW revs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: replace memset+kfree with kzfree
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Clean up redundant #include
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [Crypto v6 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [cryptodev:master 22/38] drivers/crypto/virtio/virtio_crypto_algs.c:494:9: error: implicit declaration of function 'crypto_transfer_cipher_request_to_engine'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [cryptodev:master 22/38] drivers/crypto/virtio/virtio_crypto_algs.c:494:9: error: implicit declaration of function 'crypto_transfer_cipher_request_to_engine'; did you mean 'crypto_transfer_skcipher_request_to_engine'?
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 2/2] include: psp-sev: Capitalize invalid length enum
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 9/38] drivers/crypto/ccree/cc_cipher.c:629:15-22: WARNING opportunity for kmemdep
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: fix memdup.cocci warnings
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: ccree: Introduce Arm TrustZone CryptoCell
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mcryptd - remove pointless wrapper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Crypto v5 03/12] support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: sha512-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-pkcs1pad: Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto_user: Replace GFP_ATOMIC with GFP_KERNEL in crypto_report
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: chelsio - Make function aead_ccm_validate_input static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Make several functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Make function ccp_get_dma_chan_attr static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: stm32/cryp - add AEAD cipher algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Crypto v5 03/12] support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: stm32/hash: Correction to improve robustness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: caam/qi - return -EBADMSG for ICV check failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha256-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH Resend 5/5] hwrng: stm32 - rework read timeout calculation
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH Resend 3/5] hwrng: stm32 - allow disable clock error detection
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 2/5] dt-bindings: rng: add reset node for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 4/5] dt-bindings: rng: add clock detection error for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 1/5] hwrng: stm32 - add reset during probe
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [Crypto v4 12/12] Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] chtls_netdev() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam: Use common error handling code in four functions
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: caam: Delete an error message for a failed memory allocation in seven functions
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [Crypto v5 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 11/12] chtls: Register the chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 02/12] ethtool: feature for Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [Crypto v4 12/12] Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: bcm: Delete an error message for a failed memory allocation in do_shash()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/bcm: Adjustments for do_shash()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: bfin_crc: Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] crypto: speck - add test vectors for Speck64-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/5] crypto: speck - add test vectors for Speck128-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 2/5] crypto: speck - export common helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: add support for the Speck block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: caam: Use common error handling code in four functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: Delete an error message for a failed memory allocation in seven functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/caam: Adjustments for eight function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/14] x86/crypto: aesni: Add GCM_INIT macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 05/14] x86/crypto: aesni: Merge encode and decode to GCM_ENC_DEC macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 04/14] x86/crypto: aesni: Add GCM_COMPLETE macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 07/14] x86/crypto: aesni: Split AAD hash calculation to separate macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 06/14] x86/crypto: aesni: Introduce gcm_context_data
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 08/14] x86/crypto: aesni: Fill in new context data structures
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 09/14] x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 13/14] x86/crypto: aesni: Introduce scatter/gather asm function stubs
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 12/14] x86/crypto: aesni: Add fast path for > 16 byte update
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 11/14] x86/crypto: aesni: Introduce partial block macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 10/14] x86/crypto: aesni: Move HashKey computation from stack to gcm_context
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 02/14] x86/crypto: aesni: Macro-ify func save/restore
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 01/14] x86/crypto: aesni: Merge INITIAL_BLOCKS_ENC/DEC
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 00/14] x86/crypto gcmaes SSE scatter/gather support
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] crypto: virtio: convert to new crypto engine API
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: omap: Delete an error message for a failed memory allocation in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/omap: Adjustments for three function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: Improve a size determination in sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: sahara: Delete an error message for a failed memory allocation in sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] crypto: engine - Permit to enqueue all async requests
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- [PATCH 0/2] crypto/sahara: Adjustments for sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/4] crypto: ux500: Delete two unnecessary variable initialisations in ux500_cryp_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ux500: Adjust an error message in ux500_cryp_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: ux500: Adjust two condition checks in ux500_cryp_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ux500: Delete an error message for a failed memory allocation in ux500_cryp_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Ux500 crypto: Adjustments for ux500_cryp_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Dave Watson <davejwatson@xxxxxx>
- RE: [Crypto v4 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix incorrect values in PKCS#1 test vector
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 7/8] crypto: inside-secure - keep the requests push/pop synced
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 3/8] crypto: inside-secure - fix the extra cache computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 8/8] crypto: inside-secure - unmap the result in the hash send error path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 5/8] crypto: inside-secure - do not process request if no command was issued
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 6/8] crypto: inside-secure - fix the invalidation step during cra_exit
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 0/8] crypto: inside-secure - stabilization and fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 4/8] crypto: inside-secure - fix the cache_len computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/8] crypto: inside-secure - do not overwrite the threshold value
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/8] MAINTAINERS: update the Inside Secure maintainer email
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH] crypto: Fix incorrect values in PKCS#1 test vector
- From: "Mcloughlin, Conor" <conor.mcloughlin@xxxxxxxxx>
- Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 5/5] crypto: speck - add test vectors for Speck64-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/5] crypto: speck - add test vectors for Speck128-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/5] crypto: speck - export common helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/5] crypto: add support for the Speck block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: Handle deferred clock properly
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] hwrng: bcm2835: Handle deferred clock properly
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH 06/14] x86/crypto: aesni: Introduce gcm_context_data
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 10/14] x86/crypto: aesni: Move HashKey computation from stack to gcm_context
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 13/14] x86/crypto: aesni: Introduce scatter/gather asm function stubs
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 05/14] x86/crypto: aesni: Merge encode and decode to GCM_ENC_DEC macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 12/14] x86/crypto: aesni: Add fast path for > 16 byte update
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 11/14] x86/crypto: aesni: Introduce partial block macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 09/14] x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 08/14] x86/crypto: aesni: Fill in new context data structures
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 07/14] x86/crypto: aesni: Split AAD hash calculation to separate macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 00/14] x86/crypto gcmaes SSE scatter/gather support
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 03/14] x86/crypto: aesni: Add GCM_INIT macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 04/14] x86/crypto: aesni: Add GCM_COMPLETE macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH 02/14] x86/crypto: aesni: Macro-ify func save/restore
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [Crypto v4 03/12] support for inline tls
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 01/14] x86/crypto: aesni: Merge INITIAL_BLOCKS_ENC/DEC
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [Crypto v4 01/12] tls: tls_device struct to register TLS drivers
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
- From: Jinbum Park <jinb.park7@xxxxxxxxx>
- [Crypto v4 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 11/12] chtls: Register the chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 02/12] ethtool: feature for Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v4 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: hashing bit oriented messages
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- hashing bit oriented messages
- From: Jitendra Lulla <lulla.jitendra@xxxxxxxxx>
- Crypto Fixes for 4.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sunxi-ss: Add MODULE_ALIAS to sun4i-ss
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH v3 2/4] crypto: AF_ALG - inline IV support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: AF_ALG - allow driver to serialize IV access
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [PATCH v3 0/3] MIPS CRC instruction support
- From: James Hogan <jhogan@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] sun4i_ss_prng fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/generic - sha3: deal with oversize stack frames
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: fix Kernel Oops on hashing an empty file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512-mb - initialize pending lengths correctly
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 8/9] X.509: remove dead code that set ->unsupported_sig
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/9] PKCS#7: remove unnecessary check for NULL sinfo->sig->hash_algo
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/9] PKCS#7 / X.509 fixes and cleanups
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Vakul Garg <vakul.garg@xxxxxxx>
- RE: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Speck support
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH 2/5] crypto: speck - export common helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/5] crypto: speck - add test vectors for Speck128-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/5] crypto: speck - add test vectors for Speck64-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm/speck: add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/5] crypto: add support for the Speck block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v3] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: AF_ALG AIO improvements
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/4] crypto: AF_ALG - inline IV support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: AF_ALG - inline IV support
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/2] crypto: stm32/cryp - add AEAD cipher algorithms
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH 1/2] crypto: stm32/cryp - add aes gcm / ccm support
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH 2/2] crypto: stm32/cryp - add stm32mp1 support
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
- From: Artem Savkov <asavkov@xxxxxxxxxx>
- [PATCH v2] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: AF_ALG AIO improvements
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 3/4] crypto: AF_ALG - allow driver to serialize IV access
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: AF_ALG - inline IV support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- [PATCH 9/9] X.509: self_signed implies !unsupported_sig
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 8/9] X.509: remove dead code that set ->unsupported_sig
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 7/9] X.509: remove never-set ->unsupported_key flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 6/9] PKCS#7: remove unnecessary check for NULL sinfo->sig->hash_algo
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/9] X.509: fix NULL dereference when restricting key with unsupported_sig
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/9] PKCS#7: fix direct verification of SignerInfo signature
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/9] PKCS#7: fix certificate blacklisting
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/9] PKCS#7: fix certificate chain verification
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/9] PKCS#7 / X.509 fixes and cleanups
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: qat - Make several functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Make function ccp_get_dma_chan_attr static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: chelsio - Make function aead_ccm_validate_input static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
- From: Artem Savkov <artem.savkov@xxxxxxxxx>
- [PATCH 2/2] sun4i_ss_prng: convert lock to _bh in sun4i_ss_prng_generate
- From: Artem Savkov <artem.savkov@xxxxxxxxx>
- [PATCH 0/2] sun4i_ss_prng fixes
- From: Artem Savkov <artem.savkov@xxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] crypto: caam - fix endless loop when DECO acquire fails
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH AUTOSEL for 4.14 053/110] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL for 4.9 22/52] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- [PATCH AUTOSEL for 4.4 11/32] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] libcrc32c: Add crc32c_impl function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_register_alg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libcrc32c: Add crc32c_impl function
- From: David Sterba <dsterba@xxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH 1/3] compiler-gcc.h: Introduce __optimize function attribute
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: sha3-generic - Use __optimize to support old compilers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 4/5] clk: imx7d: add CAAM clock
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 5/5] ARM: dts: imx7s: add CAAM device node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 1/3] compiler-gcc.h: Introduce __optimize function attribute
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: sha3-generic - Use __optimize to support old compilers
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- RE: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- RE: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Dave Watson <davejwatson@xxxxxx>
- RE: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCHv2] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- RE: [PATCH] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tls: Add support for encryption using async offload accelerator
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] tls: Add support for encryption using async offload accelerator
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- [PATCH] tls: Add support for encryption using async offload accelerator
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v3 1/5] crypto: caam: Fix null dereference at error path
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v3 4/5] clk: imx7d: add CAAM clock
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in crypto_destroy_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in aead_accept_parent_nokey
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in af_alg_alloc_tsgl
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/3] arm64: dts: hisi: add SEC crypto accelerator nodes for hip07 SoC
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [RFC PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- [RFC PATCH 0/3] Hisilicon SEC accelerator driver
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] crypto: AF_ALG AIO - lock context IV
- From: Stephan Müller <smueller@xxxxxxxxxx>
- RE: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/5] hwrng: stm32 - add reset during probe
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 4/5] dt-bindings: rng: add clock detection error for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/5] dt-bindings: rng: add reset node for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 3/5] hwrng: stm32 - allow disable clock error detection
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Crypto Update for 4.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: stm32/hash: fix performance issues
- From: Lionel Debieve <lionel.Debieve@xxxxxx>
- [PATCH 0/3] crypto: stm32/hash: Correction to improve robustness
- From: Lionel Debieve <lionel.Debieve@xxxxxx>
- [PATCH 3/3] crypto: stm32/hash: rework padding length
- From: Lionel Debieve <lionel.Debieve@xxxxxx>
- [PATCH 1/3] crypto: stm32/hash: avoid error if maxburst not defined
- From: Lionel Debieve <lionel.Debieve@xxxxxx>
- Re: [PATCH][next] hwrng: exynos: check for -ve error return from readl_poll_timeout
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: caam/qi - add GCM support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/3] crypto: caam - prepare for gcm(aes) support over QI interface
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam/qi - return -EBADMSG for ICV check failure
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- RE: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto/generic - sha3: deal with oversize stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [RESEND PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/6] Documentation: crypto: document crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 3/6] crypto: omap: convert to new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 5/6] crypto: stm32-hash: convert to the new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 4/6] crypto: virtio: convert to new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 6/6] crypto: stm32-cryp: convert to the new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/6] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [RESEND PATCH v2 4/5] clk: imx7d: add CAAM clock
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 5/5] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 1/5] crypto: caam: Fix null dereference at error path
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2 1/5] crypto: caam: Fix null dereference at error path
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] clk: imx7d: add CAAM clock
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AES-NI GCM - handle zero length dst buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: inside-secure - make function safexcel_try_push_requests static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: artpec6 - remove select on non-existing CRYPTO_SHA384
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: axis - remove unnecessary platform_get_resource() error check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr.c: test misuse of result in ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos: fix Kernel Oops on hashing an empty file
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [cryptodev:master 165/172] crypto/sha3_generic.c:147:1: warning: the frame size of 1232 bytes is larger than 1024 bytes
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mcryptd - remove pointless wrapper functions
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [RFC crypto v3 8/9] chtls: Register the ULP
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RESEND PATCH 1/6] crypto: caam: Fix null dereference at error path
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
- From: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: crypto_user: Replace GFP_ATOMIC with GFP_KERNEL in crypto_report
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- [PATCH] crypto: rsa-pkcs1pad: Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- [PATCH] crypto: sha512-mb - remove HASH_FIRST flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: sha256-mb - remove HASH_FIRST flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: mcryptd - remove pointless wrapper functions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] sparc64: fix typo in CONFIG_CRYPTO_DES_SPARC64 => CONFIG_CRYPTO_CAMELLIA_SPARC64
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: enable 128-bit memory read/write support
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- [RESEND PATCH 1/6] crypto: caam: Fix null dereference at error path
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 4/6] imx7d: add CAAM clocks
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 5/6] crypto: caam: add logic to detect when running under TrustZone
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 2/6] crypto: caam: Fix endless loop when RNG is already initialized
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
- From: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
- Re: Odroid HC1 cryptsetup:encrypt sata driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Odroid HC1 cryptsetup:encrypt sata driver
- From: Anand Moon <linux.amoon@xxxxxxxxx>
- Re: [PATCH 3/3] arm64: enable 128-bit memory read/write support
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH RFC 0/3] API for 128-bit IO access
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH RFC 0/3] API for 128-bit IO access
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] asm-generic/io.h: API for 128-bit memory accessors
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] arm64: enable 128-bit memory read/write support
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] UAPI: Introduce 128-bit types and byteswap operations
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sha512-mb - initialize pending lengths correctly
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH] sparc64: fix typo in CONFIG_CRYPTO_DES_SPARC64 => CONFIG_CRYPTO_CAMELLIA_SPARC64
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - inline IV support
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [RFC crypto v3 0/9] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: chelsio - Delete stray tabs in create_authenc_wr()
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - inline IV support
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - inline IV support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - inline IV support
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] crypto: chelsio - Delete stray tabs in create_authenc_wr()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: ccree: Introduce Arm TrustZone CryptoCell
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/7] staging: ccree: rename staging ver and mark as broken
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/7] crypto: ccree: add skcipher support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/7] crypto: ccree: introduce CryptoCell driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/7] crypto: ccree: add AEAD support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/7] crypto: ccree: add ahash support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 7/7] MAINTAINERS: update ccree entry
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/7] crypto: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH][next] staging: ccree: fix memory leaks in cc_ivgen_init
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC crypto v3 0/9] Chelsio Inline TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: Getting the ccree driver out of staging
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFT PATCH] crypto: arm64 - implement SM3 secure hash using special instructions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - inline IV support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2] [v2] crypto: aes-generic - fix aes-generic regression on powerpc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 130/155] aes_generic.c:undefined reference to `_restgpr_31_x'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
- From: Alexey Khoroshilov <khoroshilov@xxxxxxxxx>
- Re: [PATCH 1/1] crypto: chelsio - Fix indentation warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: chelsio - fix code indentation warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 8/8] crypto/arm64: sha512 - fix/improve new v8.2 Crypto Extensions code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/8] crypto/arm64: sm3 - new v8.2 Crypto Extensions implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/8] crypto/arm64: sha3 - new v8.2 Crypto Extensions implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/8] crypto/testmgr: sha3 - add new testcases
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/8] crypto/generic: sha3 - export init/update/final routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/8] crypto/generic: sha3 - simplify code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/8] crypto/generic: sha3: rewrite KECCAK transform to help the compiler optimize
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/8] crypto/generic: sha3 - fixes for alignment and big endian operation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: chelsio - Fix indentation warning
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v2] crypto: AES-NI GCM - handle zero length dst buffer
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: AES-NI GCM - handle zero length dst buffer
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [cryptodev:master 147/154] drivers/crypto/chelsio/chcr_algo.c:2113:2: note: in expansion of macro 'if'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 3/5] crypto: ux500/hash: Add empty export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] crypto: bfin_crc: Add empty hash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] crypto: n2_core: Add empty hash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] crypto: mxs-dcp: Add empty hash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: kernel failure while loading X.509 certificate
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: n2_core: Add empty hash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500/hash: Add empty export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] sha3 fixes and new implementation for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] [v2] crypto: aes-generic - fix aes-generic regression on powerpc
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500/hash: Add empty export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 147/154] drivers/crypto/chelsio/chcr_algo.c:2113:2: warning: this 'if' clause does not guard...
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH] hwrng: imx-rngc: simplify the power management definitions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Fix DMA API misuse
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: mediatek: Setup default RNG quality
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: exynos - Signedness bug in exynos_trng_do_read()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: chelsio - Cleanup and bug fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] arm64: move literal data into .rodata section
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFT PATCH] crypto: arm64 - implement SHA-512 using special instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: exynos-rng - Add SPDX license identifier and correct module license
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] arm64: move literal data into .rodata section
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/7] arm64: move literal data into .rodata section
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ahash: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [bug report] crypto: lrw - Convert to skcipher
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: kernel failure while loading X.509 certificate
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [PATCH] crypto: ux500/hash: Add empty export and import
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 1/7] staging: ccree: remove ccree from staging tree
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [BUG] skcipher: Test 1 failed (invalid result) on encryption for cts(virtio_crypto_aes_cbc)
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH -next] staging: ccree: remove redundant dev_err call in init_cc_resources()
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]