Linux Crypto
[Prev Page][Next Page]
- Re: [RFC PATCH 3/7] vfio: add spimdev support
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- RE: [RFC PATCH 1/7] vfio/spimdev: Add documents for WarpDrive framework
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 2/7] iommu: Add share domain interface in iommu for spimdev
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 3/7] vfio: add spimdev support
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 1/7] vfio/spimdev: Add documents for WarpDrive framework
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/7] iommu: Add share domain interface in iommu for spimdev
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] vfio: add spimdev support
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- RE: [RFC PATCH 3/7] vfio: add spimdev support
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 2/7] iommu: Add share domain interface in iommu for spimdev
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 1/7] vfio/spimdev: Add documents for WarpDrive framework
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 3/7] vfio: add spimdev support
- From: Kenneth Lee <liguozhu@xxxxxxxxxxxxx>
- RE: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [bug report] crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command
- From: "Natarajan, Janakarajan" <Janakarajan.Natarajan@xxxxxxx>
- Re: [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: Jerome Glisse <jglisse@xxxxxxxxxx>
- Re: [PATCH v1 2/3] zinc: Introduce minimal cryptography library
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/7] vfio: add spimdev support
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH 7/7] vfio/spimdev: add user sample for spimdev
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 6/7] crypto: add spimdev support to Hisilicon QM
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 5/7] crypto: Add Hisilicon Zip driver
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 4/7] crypto: add hisilicon Queue Manager driver
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 3/7] vfio: add spimdev support
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 2/7] iommu: Add share domain interface in iommu for spimdev
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 1/7] vfio/spimdev: Add documents for WarpDrive framework
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- [RFC PATCH 0/7] A General Accelerator Framework, WarpDrive
- From: Kenneth Lee <nek.in.cn@xxxxxxxxx>
- Re: [PATCH v1 2/3] zinc: Introduce minimal cryptography library
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-gcm - add missing kernel_neon_begin/end pair
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-gcm - add missing kernel_neon_begin/end pair
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-gcm - add missing kernel_neon_begin/end pair
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: arm64/aes-ce-gcm - don't reload key schedule if avoidable
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] crypto/arm64: aes-ce-gcm - implement 2-way aggregation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] crypto/arm64: aes-ce-gcm - operate on two input blocks at a time
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] crypto/arm64: aes-ce-gcm - switch to 2-way aggregation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: joeyli <jlee@xxxxxxxx>
- [PATCH][RESEND] lib/mpi: remove redundant variable esign
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: arm64 - revert NEON yield for fast AEAD implementations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] crypto/arm64: aes-ce-gcm - implement 2-way aggregation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto/arm64: aes-ce-gcm - operate on two input blocks at a time
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/2] crypto/arm64: aes-ce-gcm - switch to 2-way aggregation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: dh - make crypto_dh_encode_key() make robust
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 1/2] crypto: dh - fix calculating encoded key size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 0/6] lib/crc32: treewide: Use existing define with polynomial
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rmd320 - use swap macro in rmd320_transform
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rmd256 - use swap macro in rmd256_transform
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha256 - increase cra_priority of scalar implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: Add Qcom PRNG support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: CTR DRBG - in-place cipher operation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/arm64: aes-ce-gcm - add missing kernel_neon_begin/end pair
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: CTR DRBG - in-place cipher operation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: CTR DRBG - in-place cipher operation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] crypto: Remove mcryptd
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH] crypto: ccp: Check for NULL PSP pointer at module unload
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH] crypto: ccp: Check for NULL PSP pointer at module unload
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: "bigeasy@xxxxxxxxxxxxx" <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: 答复: [PATCH 1/3] crypto: skcipher - fix crash flushing dcache in error path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- 答复: [PATCH 1/3] crypto: skcipher - fix crash flushing dcache in error path
- From: "gaokui (A)" <gaokui1@xxxxxxxxxx>
- Re: [PATCH v6 10/18] x86/power/64: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: "bigeasy@xxxxxxxxxxxxx" <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v6 10/18] x86/power/64: Remove VLA usage
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 13/18] wireless/lib80211: Convert from ahash to shash
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: "bigeasy@xxxxxxxxxxxxx" <bigeasy@xxxxxxxxxxxxx>
- RE: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: "bigeasy@xxxxxxxxxxxxx" <bigeasy@xxxxxxxxxxxxx>
- RE: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Vakul Garg <vakul.garg@xxxxxxx>
- Re: [PATCH] crypto: arm/chacha20 - always use vrev for 16-bit rotates
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: arm/chacha20 - always use vrev for 16-bit rotates
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 18/18] crypto: Remove AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 17/18] crypto: ccm: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 18/18] crypto: Remove AHASH_REQUEST_ON_STACK
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto/arm64: sha2 - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] crypto/arm64: sha1 - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] crypto/arm64: aes-ccm - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] crypto/arm64: reduce impact of NEON yield checks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 17/18] crypto: ccm: Remove VLA usage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v6 18/18] crypto: Remove AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 16/18] rxrpc: Reuse SKCIPHER_REQUEST_ON_STACK buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 17/18] crypto: ccm: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 02/18] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 01/18] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 03/18] crypto: hash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 04/18] dm: Remove VLA usage from hashes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 05/18] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 00/18] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 07/18] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 09/18] ppp: mppe: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 08/18] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 06/18] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 14/18] staging: rtl8192u: ieee80211: Convert from ahash to shash
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 13/18] wireless/lib80211: Convert from ahash to shash
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 15/18] staging: rtl8192e: ieee80211: Convert from ahash to shash
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 12/18] drbd: Convert from ahash to shash
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 11/18] dm crypt: Convert essiv from ahash to shash
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 10/18] x86/power/64: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: joeyli <jlee@xxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: allow bigger than sector XTS op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: zero all of request ctx before use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: ccree: remove cipher ivgen left overs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: drop useless type flag during reg
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: ccree: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- [PATCH 1/4] treewide: convert ISO_8859-1 text comments to utf-8
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: Add Qcom PRNG support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: Does /dev/urandom now block until initialised ?
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH 3/3] crypto: ablkcipher - fix crash flushing dcache in error path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/3] crypto: blkcipher - fix crash flushing dcache in error path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/3] crypto: skcipher - fix crash flushing dcache in error path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/3] crypto: fix crash in scatterwalk_pagedone()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: skcipher - remove unnecessary setting of walk->nbytes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: scatterwalk - remove scatterwalk_samebuf()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: scatterwalk - remove 'chain' argument from scatterwalk_crypto_chain()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: skcipher - fix aligning block size in skcipher_copy_iv()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: Does /dev/urandom now block until initialised ?
- From: Ken Moffat <zarniwhoop73@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Yu Chen <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Yu Chen <yu.c.chen@xxxxxxxxx>
- Re: Does /dev/urandom now block until initialised ?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon SEC security accelerator driver
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 3/3] arm64: dts: hisi: add SEC crypto accelerator nodes for hip07 SoC
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH V2 0/3] Hisilicon SEC crypto driver (hip06 / hip07)
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: Does /dev/urandom now block until initialised ?
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon SEC security accelerator driver
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: tcrypt - reschedule during speed tests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: CCREE performance on R-Car H3 + crash
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: virtio: Replace GFP_ATOMIC with GFP_KERNEL in __virtio_crypto_ablkcipher_do_req()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- [PATCH] crypto: qat: adf_aer: Replace GFP_ATOMIC with GFP_KERNEL in adf_dev_aer_schedule_reset()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- [PATCH] crypto: cavium: nitrox: Replace GFP_ATOMIC with GFP_KERNEL in crypto_alloc_context()
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH 13/14] arm64: dts: marvell: armada-cp110: update the crypto engine compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [REPORT] Possible unnecessary usages of GFP_ATOMIC in crypto/ablkcipher.c
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [REPORT] Possible unnecessary usages of GFP_ATOMIC in crypto/ablkcipher.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Does /dev/urandom now block until initialised ?
- From: Ken Moffat <zarniwhoop73@xxxxxxxxxxxxxx>
- [REPORT] Possible unnecessary usages of GFP_ATOMIC in crypto/ablkcipher.c
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH 13/14] arm64: dts: marvell: armada-cp110: update the crypto engine compatible
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: hisilicon SEC security accelerator driver
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: INFO: task hung in aead_recvmsg
- From: syzbot <syzbot+56c7151cad94eec37c521f0e47d2eee53f9361c4@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: make sure swap arguments are the same type? (was: Re: [PATCH] crypto: rmd320 - use swap macro in rmd320_transform)
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Laura Abbott <labbott@xxxxxxxxxx>
- [PATCH] crypto: CTR DRBG - in-place cipher operation
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: make sure swap arguments are the same type? (was: Re: [PATCH] crypto: rmd320 - use swap macro in rmd320_transform)
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] crypto: dh - fix memory leak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: DRBG - eliminate constant reinitialization of SGL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sharah: Unregister correct algorithms for SAHARA 3
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - switch to SPDX identifiers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: DH - update test for public key verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: ECDH - fix typo of P-192 b value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - initialize first_rdesc to make GCC happy
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Add 0 walk-offset check in scatterwalk_pagedone()
- From: 罗新强 <luoxinqiang2@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] crypto: Remove mcryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] random: addu a config option to trust the CPU's hwrng
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] random: addu a config option to trust the CPU's hwrng
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Yu Chen <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix calculating encoded key size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4][RFC v2] PM / Hibernate: Encrypt the snapshot pages before submitted to the block device
- From: Yu Chen <yu.c.chen@xxxxxxxxx>
- Re: [dm-devel] [PATCH v5 05/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Ken Moffat <zarniwhoop73@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Yu Chen <yu.c.chen@xxxxxxxxx>
- Re: [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] random: addu a config option to trust the CPU's hwrng
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- make sure swap arguments are the same type? (was: Re: [PATCH] crypto: rmd320 - use swap macro in rmd320_transform)
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] crypto: rmd320 - use swap macro in rmd320_transform
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] random: addu a config option to trust the CPU's hwrng
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Ken Moffat <zarniwhoop73@xxxxxxxxxxxxxx>
- [PATCH] crypto: rmd256 - use swap macro in rmd256_transform
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH 4/4][RFC v2] tools: create power/crypto utility
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- [PATCH 2/4][RFC v2] PM / hibernate: Install crypto hooks for hibernation encryption
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- [PATCH 1/4][RFC v2] PM / Hibernate: Add helper functions for hibernation encryption
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- [PATCH 0/4][RFC v2] Introduce the in-kernel hibernation encryption
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: INFO: task hung in tls_push_record
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Yann Droneaud <ydroneaud@xxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 0/6] lib/crc32: treewide: Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] random: add a config option to trust the CPU's hwrng
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] random: add a config option to trust the CPU's hwrng
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH -v2] random: mix rdrand with entropy sent in from userspace
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/6] lib/crc32: treewide: Use existing define with polynomial
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH v5 05/11] crypto: ahash: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [dm-devel] [PATCH v5 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v5 05/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: arm64/sha256 - increase cra_priority of scalar implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH v5 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH v5 05/11] crypto: ahash: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/6] crypto: stm32_crc32 - Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 1/6] lib/crc: Move polynomial definition to separate header
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 0/6] lib/crc32: treewide: Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 6/6] lib: Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 5/6] staging: rtl: Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 4/6] net: ethernet: Use existing define with polynomial
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 2/6] lib/crc: Use consistent naming for CRC-32 polynomials
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v5 01/11] crypto: xcbc: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/11] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 03/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 07/11] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 00/11] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 06/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 05/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 08/11] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 02/11] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 01/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v19 0/6] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 1/6] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 2/6] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 4/6] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 6/6] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v19 5/6] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 2/3] crypto: hisilicon SEC security accelerator driver
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 3/3] arm64: dts: hisi: add SEC crypto accelerator nodes for hip07 SoC
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 0/3] Hisilicon SEC crypto driver (hip06 / hip07)
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 4.17 55/67] crypto: dont optimize keccakf()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v6 6/6] crypto: qcom: Add ACPI support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 5/6] crypto: qcom: Add support for prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 4/6] dt-bindings: crypto: Add new compatible qcom,prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 3/6] crypto: Add Qcom prng driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 2/6] dt-bindings: crypto: Move prng binding to crypto
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 1/6] hwrng: remove msm hw_random driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v6 0/6] crypto: Add Qcom PRNG support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v5 3/6] crypto: Add Qcom prng driver
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v5 3/6] crypto: Add Qcom prng driver
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Add 0 walk-offset check in scatterwalk_pagedone()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] random: mix rdrand with entropy sent in from userspace
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sharah: Unregister correct algorithms for SAHARA 3
- From: Michael Müller <michael@xxxxxxxxxxx>
- crypto: sharah: Unregister correct algorithms for SAHARA 3
- From: Michael Müller <michael@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] crypto: Add Qcom prng driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [v18,3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [v18,3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [v18,3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - initialize first_rdesc to make GCC happy
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: padlock-aes - Fix Nano workaround data corruption
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - switch to SPDX identifiers
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 14/14] arm64: dts: marvell: armada-37xx: update the crypto engine compatible
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: [PATCH 13/14] arm64: dts: marvell: armada-cp110: update the crypto engine compatible
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: [PATCH v4] AF_ALG: Initialize sg_num_bytes in error code path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls - use 64-bit arithmetic instead of 32-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix Kconfig typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] crypto: ccp - Driver updates 2018-07-03
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: padlock-aes - Fix Nano workaround data corruption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] [RESEND, net-next, v2] tcp: use monotonic timestamps for PAWS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 4.9] x86/fpu: Remove use_eager_fpu()
- From: Daniel Sangorrin <daniel.sangorrin@xxxxxxxxxxxxx>
- [PATCH v4 03/14] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/14] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 04/14] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 06/14] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 00/14] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 05/14] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 07/14] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/14] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 10/14] kbuild: Introduce FRAME_WARN_BUMP_FLAG
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 08/14] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 13/14] rxrpc: Prepare to remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 14/14] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 11/14] treewide: Prepare to remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 12/14] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 02/14] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/2] crypto: DH - update test for public key verification
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: ECDH - fix typo of P-192 b value
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix calculating encoded key size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] crypto: DH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix calculating encoded key size
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] [RESEND, net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] [RESEND, net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [bug report] crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix calculating encoded key size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: DH - add public key verification test
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH] crypto: dh - fix calculating encoded key size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v3 4.4.y 1/3] x86/fpu: Remove use_eager_fpu()
- From: Daniel Sangorrin <daniel.sangorrin@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix memory leak
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: dh - fix memory leak
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: DRBG - performance improvements for CTR DRBG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 1/2] crypto: DRBG - eliminate constant reinitialization of SGL
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: DRBG - use caller buffer if suitable
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: dh - fix memory leak
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.18
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in crypto_dh_encode_key
- From: syzbot <syzbot+6d38d558c25b53b8f4ed@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.18
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- [PATCH v2 4.9.y] x86/fpu: Remove use_eager_fpu()
- From: Daniel Sangorrin <daniel.sangorrin@xxxxxxxxxxxxx>
- [PATCH] crypto: Add 0 walk-offset check in scatterwalk_pagedone()
- From: Liu Chao <liuchao741@xxxxxxxxxx>
- [PATCH v5 4/6] dt-bindings: crypto: Add new compatible qcom,prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 5/6] crypto: qcom: Add support for prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 2/6] dt-bindings: crypto: Move prng binding to crypto
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 3/6] crypto: Add Qcom prng driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 6/6] crypto: qcom: Add ACPI support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 1/6] hwrng: remove msm hw_random driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v5 0/6] crypto: Add Qcom PRNG support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- [cryptodev:master 45/63] drivers/crypto/inside-secure/safexcel_cipher.c:475:2: warning: 'first_rdesc' may be used uninitialized in this function
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: Crypto Fixes for 4.18
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: fixes and cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: remove redundant type specifications
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: decrease priority of multibuffer SHA algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: MAINTAINERS - fix file path for SHA multibuffer code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: inside-secure - support more algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/14] crypto: inside-secure - EIP197d support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: DH - add public key verification test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: stm32 - Add power mamagement support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ECDH - add public key verification test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4] AF_ALG: Initialize sg_num_bytes in error code path
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH v3] AF_ALG: Initialize sg_num_bytes in error code path
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] AF_ALG: Initialize sg_num_bytes in error code path
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v3] AF_ALG: Initialize sg_num_bytes in error code path
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v1 5/5] crypto: ccp: Add support for new CCP/PSP device ID
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v1 4/5] crypto: ccp: Support register differences between PSP devices
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/5] crypto: ccp: Remove unused #defines
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v1 5/5] crypto: ccp: Add support for new CCP/PSP device ID
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v1 1/5] crypto: ccp: Fix command completion detection race
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v1 4/5] crypto: ccp: Support register differences between PSP devices
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v1 3/5] crypto: ccp: Remove unused #defines
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v1 2/5] crypto: ccp: Add psp enabled message when initialization succeeds
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v1 1/5] crypto: ccp: Fix command completion detection race
- From: Gary R Hook <ghook@xxxxxxx>
- Re: KMSAN: uninit-value in af_alg_free_areq_sgls
- From: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] AF_ALG: Initialize sg_num_bytes in error code path
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v1 1/5] crypto: ccp: Fix command completion detection race
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH] AF_ALG: register completely initialized request in list
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] AF_ALG: register completely initialized request in list
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH] AF_ALG: register completely initialized request in list
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] Revert "crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64"
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] Revert "crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64"
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH] crypto: chtls - use 64-bit arithmetic instead of 32-bit
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] Revert "crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64"
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH] Revert "crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64"
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Timur Tabi <timur@xxxxxxxxxx>
- [PATCH v4 1/6] hwrng: remove msm hw_random driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v4 0/6] crypto: Add Qcom PRNG support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v4 2/6] dt-bindings: crypto: Move prng binding to crypto
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v4 3/6] crypto: Add Qcom prng driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v4 4/6] dt-bindings: crypto: Add new compatible qcom,prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v4 5/6] crypto: qcom: Add support for prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v4 6/6] crypto: qcom: Add ACPI support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH v1 5/5] crypto: ccp: Add support for new CCP/PSP device ID
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 4/5] crypto: ccp: Support register differences between PSP devices
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 3/5] crypto: ccp: Remove unused #defines
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 2/5] crypto: ccp: Add psp enabled message when initialization succeeds
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 1/5] crypto: ccp: Fix command completion detection race
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v1 0/5] crypto: ccp - Driver updates 2018-07-03
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Jeffrey Hugo <jhugo@xxxxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: linux-next crash in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- linux-next crash in CAAM driver
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxx>
- Re: [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/6] dt-bindings: crypto: Move prng binding to crypto
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 3/6] crypto: Add Qcom prng driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 4/6] dt-bindings: crypto: Add new compatible qcom,prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 5/6] crypto: qcom: Add support for prng-ee
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 6/6] crypto: qcom: Add ACPI support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 1/6] hwrng: remove msm hw_random driver
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- [PATCH v3 0/6] crypto: Add Qcom PRNG support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 9/9 v2] crypto: atmel-ecc: Break out lock check helper
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 7/9 v2] crypto: atmel-ecc: Print out serial number
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: ccree: rate limit debug print
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH net] ipv6: sr: fix passing wrong flags to crypto_alloc_shash()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 6/9 v2] crypto: atmel-ecc: Marshal the command while sending
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/9 v2] crypto: atmel-ecc: More helpful error messages
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/9 v2] crypto: atmel-ecc: Just warn on missing clock frequency
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: zip: make several functions static
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- [PATCH] staging/skein: Remove Skein and Threefish code
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: skcipher: remove the exporting of skcipher_walk_next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: vmac - various fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] crypto: testmgr: add hash finup tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/6] crypto: ccree: remove dead legacy code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/6] crypto: ccree: use CBC-CS3 CTS mode
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/6] crypto: ccree: rate limit debug print
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/6] crypto: ccree: fix iv handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/6] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/6] crypto: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto: skcipher - remove useless setting of type flags
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] crypto: ahash - remove useless setting of cra_type
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: ahash - remove useless setting of type flags
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH net] ipv6: sr: fix passing wrong flags to crypto_alloc_shash()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 6/6] crypto: remove redundant type flags from tfm allocation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/6] crypto: skcipher - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/6] crypto: aead - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/6] crypto: ahash - remove useless setting of cra_type
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/6] crypto: ahash - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/6] crypto: shash - remove useless setting of type flags
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/6] crypto: remove redundant type specifications
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: zip: make several functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/4] crypto: x86/sha-mb - decrease priority of multibuffer algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/4] crypto: sha512_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/4] crypto: sha256_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/4] crypto: sha1_generic - add cra_priority
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/4] crypto: decrease priority of multibuffer SHA algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] crypto: MAINTAINERS - fix file path for SHA multibuffer code
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH v3 0/9] Crypto: Remove VLA usage (part 1)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/9] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/9] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/9] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/9] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/9] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/9] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 7/9] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 9/9] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 8/9] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Timur Tabi <timur@xxxxxxxxxx>
- [PATCH 03/14] Documentation/bindings: crypto: inside-secure: update the compatibles
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/14] crypto: inside-secure - filter out the algorithms by engine
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/14] crypto: inside-secure - move the firmware to a better location
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/14] crypto: inside-secure - use precise compatibles
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/14] crypto: inside-secure - dynamic ring configuration allocation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/14] crypto: inside-secure - eip197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/5] crypto: inside-secure - hmac(md5) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 3/5] crypto: inside-secure - ecb(des) and cbc(des) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/5] crypto: inside-secure - md5 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 5/5] crypto: inside-secure - remove request list to improve performance
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 0/5] crypto: inside-secure - support more algorithms
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 4/5] crypto: inside-secure - ecb(des3_ede) and cbc(des3_ede) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/14] crypto: inside-secure - add multiple processing engine support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 13/14] arm64: dts: marvell: armada-cp110: update the crypto engine compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/14] crypto: inside-secure - reset CDR and RDR rings on module removal
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/14] crypto: inside-secure - set tx_max_cmd_queue to 32
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 14/14] arm64: dts: marvell: armada-37xx: update the crypto engine compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/14] Documentation/bindings: crypto: inside-secure: eip197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/14] crypto: inside-secure - add an invalidation flag
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/14] crypto: inside-secure - adjust the TRC configuration for EIP197D
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/14] crypto: inside-secure - EIP197d support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 5/9 v2] crypto: atmel-ecc: Create a config word reader
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 7/9 v2] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 6/9 v2] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 8/9 v2] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 9/9 v2] crypto: atmel-ecc: Break out lock check helper
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 4/9 v2] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 3/9 v2] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/9 v2] crypto: atmel-ecc: Just warn on missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/9 v2] crypto: atmel-ecc: Make available for other platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: ccree: fix iv handling
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] crypto: ccree: cc_update_ctr() can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/4] crypto: testmgr: add hash finup tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: fix iv handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: remove dead legacy code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH v2] crypto: DH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: DH - add public key verification test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/3] crypto: stm32/cryp - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 3/3] crypto: stm32/crc - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] crypto: stm32/hash - Add power management support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/3] crypto: stm32 - Add power mamagement support
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RFC PATCH] crypto: DH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5 01/27] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 00/11] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 03/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 04/11] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 06/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 07/11] crypto alg: Introduce generic max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 01/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 08/11] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 05/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 02/11] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v2 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]