Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH v2 0/2] Fix GCC -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [PATCH] crypto: ECDH - add public key verification test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: Add missing RETs
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- [PATCH] x86/crypto: Add missing RETs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Jan Glauber <jan.glauber@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Max Filippov <jcmvbkbc@xxxxxxxxx>
- [RFC PATCH 1/2] crypto: Fix -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [RFC PATCH 2/2] kobject: Fix -Wstringop-truncation warning
- From: Stafford Horne <shorne@xxxxxxxxx>
- [RFC PATCH 0/2] Fix GCC -Wstringop-truncation warnings
- From: Stafford Horne <shorne@xxxxxxxxx>
- [cryptodev:master 9/15] drivers/crypto/inside-secure/safexcel_hash.c:1373:25: sparse: cast truncates bits from constant value (cbbb9d5dc1059ed8 becomes c1059ed8)
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- [cryptodev:master 5/15] drivers/crypto/inside-secure/safexcel_hash.c:1299:25: sparse: cast truncates bits from constant value (6a09e667f3bcc908 becomes f3bcc908)
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v18 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: sahara - Add i.MX51 entry
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara - Add i.MX51 entry
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: fsl-imx-sahara: Add i.MX51 as a supported SoC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH][next] crypto: aegis: fix indentation of a statement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: make structure algs static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - remove overly verbose dev_info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-ecc - fix to allow multi segment scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] crypto: inside-secure - sha512/384 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - increase minimum transfer size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] crypto: thunderx_zip - Make functions static
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 4/5] crypto: testmgr - Add test vectors for LZS compression
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 3/5] crypto: testmgr - Improve compression/decompression test
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 2/5] crypto: thunderx_zip - Add driver names and module aliases
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 1/5] crypto: deflate - Rename to generic
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- [PATCH 0/5] Improve crypto compression tests
- From: Jan Glauber <jglauber@xxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: msm: add ACPI support
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/2] hwrng: msm: add ACPI support
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- [PATCH 1/2] hwrng: msm: add a spinlock and support for blocking reads
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Timur Tabi <timur@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix finup
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccree: fix finup
- From: Hadar Gat <hadar.gat@xxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: James Morris <jmorris@xxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [dm-devel] [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [dm-devel] [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Juan Manuel Torres Palma <j.m.torrespalma@xxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 03/11] crypto: ahash: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/11] crypto: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/11] crypto: shash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/11] dm verity fec: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/11] dm integrity: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/11] crypto: ahash: Remove VLA usage for AHASH_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/11] crypto: shash: Remove VLA usage in unaligned hashing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/11] crypto: qat: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/11] crypto: cbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/11] crypto: xcbc: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/11] crypto alg: Introduce max blocksize and alignmask
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/11] crypto: skcipher: Remove VLA usage for SKCIPHER_REQUEST_ON_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/11] crypto: ahash: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: add test vectors for skein
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: add test vectors for skein
- From: Juan Manuel Torres Palma <j.m.torrespalma@xxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH] [net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] crypto: skcipher: remove the exporting of skcipher_walk_next
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v3 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto/virtio-crypto: Register an algo only if it's supported
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto/virtio-crypto: Read crypto services and algorithm masks
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
- From: Farhan Ali <alifm@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher: remove static declaration of export function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] [net-next, v2] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Stanimir Varbanov <stanimir.varbanov@xxxxxxxxxx>
- [PATCH v2 0/2] hwrng: Add support for qcpm v2 hwrng
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH v2 2/2] hwrng: msm - Add support for prng v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- Re: [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- general protection fault in scatterwalk_copychunks (3)
- From: syzbot <syzbot+db0b320fadd1b9853ebb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH] crypto: arm/speck - fix building in Thumb2 mode
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- crypto-vmx fails to load fallbacks (missing dep?)
- From: Matt Corallo <linux@xxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher: remove static declaration of export function
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/4] crypto: vmac - remove insecure version with hardcoded nonce
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/4] crypto: vmac - add nonced version with big endian digest
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/4] crypto: vmac - separate tfm and request context
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/4] crypto: vmac - require a block cipher with 128-bit block size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/4] crypto: vmac - various fixes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Vinod <vkoul@xxxxxxxxxx>
- Re: [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH net-next 3/3] tcp: use monotonic timestamps for PAWS
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH 1/3] hwrng: msm - Move hwrng to a table
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 0/3]: hwrng: Add support for qcpm v2 hwrng
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 2/3] dt-bindings: rng: Add new compatible qcom,prng-v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH 3/3] hwrng: msm - Add support for prng v2
- From: Vinod Koul <vinod.koul@xxxxxxxxxx>
- [PATCH] crypto: skcipher: remove static declaration of export function
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Stefan Agner <stefan@xxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in vmac_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- KASAN: slab-out-of-bounds Write in vmac_final
- From: syzbot <syzbot+264bca3a6e8d645550d3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/26] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v4 02/26] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: morus640 - Fix out-of-bounds access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: don't optimize keccakf()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls - use after free in chtls_pt_recvmsg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [linux-sunxi] Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 05/27] docs: Fix some broken references
- From: Coly Li <colyli@xxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxx>
- [PATCH] crypto: sun4i-ss: prevent deadlock on emulated hardware
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- [PATCH] hw_random: Always drop the RNG in hwrng_unregister()
- From: Michael Büsch <m@xxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- [PATCH v3 02/27] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v3 05/27] docs: Fix some broken references
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- [PATCH] crypto: morus640 - Fix out-of-bounds access
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+d82643ba80bf6937cd44@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel-ecc - remove overly verbose dev_info
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel-ecc - fix to allow multi segment scatterlists
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- KASAN: use-after-free Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+d82643ba80bf6937cd44@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Wirz <spam@xxxxxxxxxxxxx>
- Re: b43 crashes on rmmod (bcm4331)
- From: Michael Büsch <m@xxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+1fafa9c4cf42df33f716@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk
- From: syzbot <syzbot+1fafa9c4cf42df33f716@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH V3 2/2] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V3 1/2] powerpc/powernv: Export opal_check_token symbol
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/13] Intel SGX1 support
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 1/9] crypto: atmel-ecc: Make available for other platforms
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH V3 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Support additional signature types in EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v11 00/13] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: don't optimize keccakf()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: don't optimize keccakf()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- possible uninitialized walk.flags in skcipher_walk_virt?
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin, _end
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- [PATCH] crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin,_end
- From: Jia He <hejianet@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: James Morris <jmorris@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_finup
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] dh key: fix rounding up KDF output length
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] dh key: fix rounding up KDF output length
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha1_finup
- From: syzbot <syzbot+486f97f892efeb2075a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha256_final
- From: syzbot <syzbot+8a608baf8751184ec727@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha256_final
- From: syzbot <syzbot+8a608baf8751184ec727@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in rmd160_final
- From: syzbot <syzbot+d04e58bd384f1fe0b112@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha1_finup
- From: syzbot <syzbot+486f97f892efeb2075a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha256_finup
- From: syzbot <syzbot+29d17b7898b41ee120a5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: ccree: fix iv copying for small buffers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Q for a new API for the random device driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Q for a new API for the random device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Ladvine D Almeida <Ladvine.DAlmeida@xxxxxxxxxxxx>
- [PATCH V2] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Vinod <vkoul@xxxxxxxxxx>
- [PATCH 9/9] crypto: atmel-ecc: Break out lock check helper
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 8/9] crypto: atmel-ecc: Detail what is unlocked
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 7/9] crypto: atmel-ecc: Print out serial number
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 6/9] crypto: atmel-ecc: Marshal the command while sending
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 5/9] crypto: atmel-ecc: Create a config word reader
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 4/9] crypto: atmel-ecc: Provide config zone defines
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 3/9] crypto: atmel-ecc: More helpful error messages
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 2/9] crypto: atmel-ecc: Silently ignore missing clock frequency
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH 1/9] crypto: atmel-ecc: Make available for other platforms
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Crypto Update for 4.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [PATCH] md: dm-crypt: Add Inline Encryption support for dmcrypt
- From: Ladvine D Almeida <Ladvine.DAlmeida@xxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Oliver <oohall@xxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v3] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- [PATCH v2 0/5] crypto: Speck support
- From: Tomer Ashur <tomer.ashur@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cavium: make structure algs static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: chtls - use after free in chtls_pt_recvmsg()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Stewart Smith <stewart@xxxxxxxxxxxxx>
- Re: [RFC] crypto: Remove mcryptd
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 0/5] build warnings cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove x86 salsa20 implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto:chelsio: Fixes and cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: caam - fix MC firmware detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: clarify licensing of OpenSSL asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Mark MORUS SIMD glue as x86-specific
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: eliminate redundant decryption test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH][next] crypto: aegis: fix indentation of a statement
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] crypto: ccree: better clock handling
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: ccree: silence debug prints
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Nick Desaulniers <nick.desaulniers@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v4 01/27] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCHv2 0/2] Add new SEV commands
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_destroy_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 02/10] crypto: inside-secure - improve the counter computation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/10] crypto: sha512_generic - add a sha512 0-length pre-computed hash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/10] crypto: inside-secure - sha512 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/10] crypto: inside-secure - use the error handler for invalidation requests
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/10] crypto: inside-secure - hmac(sha512) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/10] crypto: sha512_generic - add a sha384 0-length pre-computed hash
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/10] crypto: inside-secure - sha384 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/10] crypto: inside-secure - hmac(sha384) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/10] crypto: inside-secure - authenc(hmac(sha384),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/10] crypto: inside-secure - authenc(hmac(sha512),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/10] crypto: inside-secure - sha512/384 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH v2 4/5] clk: renesas: r8a7795: add ccree clock bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: blkcipher: prefer strlcpy to strncpy
- From: Nick Desaulniers <nick.desaulniers@xxxxxxxxx>
- Re: [PATCH] crypto: morus - Hide Kconfig option for glue code
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: morus - Hide Kconfig option for glue code
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: inside-secure - increase minimum transfer size
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- [PATCH v2 0/5] build warnings cleanup
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 1/5] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 3/5] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 5/5] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 4/5] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: KASAN: use-after-free Read in crypto_destroy_tfm
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- KASAN: use-after-free Read in crypto_destroy_tfm
- From: syzbot <syzbot+352126a5be7ccb25754e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aegis256 - Fix wrong key buffer size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: crc32 cleanups and unkeyed tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls - fix a missing-check bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - do not use memset on MMIO
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] crypto: inside-secure - AEAD support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chtls: generic handling of data and hdr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/2] crypto: x86/salsa20 - remove x86 salsa20 implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/2] crypto: salsa20 - Revert "crypto: salsa20 - export generic helpers"
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/2] crypto: remove x86 salsa20 implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCHv2 1/2] crypto: ccp: Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCHv2 2/2] crypto: ccp: Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCHv2 0/2] Add new SEV commands
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [bug report] crypto: chtls - Register chtls with net tls
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Tomas Mraz <tmraz@xxxxxxxxxx>
- [PATCH] Add MODULE_FIRMWARE for all qat drivers
- From: Conor McLoughlin <conor.mcloughlin@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v2 2/5] crypto: ccree: better clock handling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: ccree: silence debug prints
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/5] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/5] clk: renesas: r8a7795: add ccree clock bindings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/5] crypto: ccree: correct host regs offset
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/5] crypto: ccree: cleanup, fixes and R-Car enabling
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] crypto:chelsio: Fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/3] crypt:chelsio:Send IV as Immediate for cipher algo
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/3] crypto:chelsio: Remove separate buffer used for DMA map B0 block in CCM
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/3] crypto:chelsio:Return -ENOSPC for transient busy indication.
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Yu Chen <yu.chen.surf@xxxxxxxxx>
- [PATCH 3/3] crypto: caam/qi - fix warning in init_cgr()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/3] crypto: caam - fix rfc4543 descriptors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: caam - fix MC firmware detection
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v7 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH] crypto: clarify licensing of OpenSSL asm code
- From: Adam Langley <agl@xxxxxxxxxx>
- Re: PBKDF2 support in the linux kernel
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: "Natarajan, Janakarajan" <jnataraj@xxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- PBKDF2 support in the linux kernel
- From: Yu Chen <yu.chen.surf@xxxxxxxxx>
- [PATCH v2] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: testmgr - eliminate redundant decryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/5] crypto: testmgr - add extra kw(aes) encryption test vector
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/5] crypto: testmgr - add extra ecb(tnepres) encryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/5] crypto: testmgr - make an cbc(des) encryption test vector chunked
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/5] crypto: testmgr - add extra ecb(des) encryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/5] crypto: eliminate redundant decryption test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] fscrypt: log the crypto algorithm implementations
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] fscrypt: add Speck128/256 support
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Stephan Müller <smueller@xxxxxxxxxx>
- 4.16: /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: x86/aegis256 - Fix wrong key buffer size
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 6/6] crypto: testmgr - add more unkeyed crc32 and crc32c test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/6] crypto: testmgr - fix testing OPTIONAL_KEY hash algorithms
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/6] crypto: testmgr - remove bfin_crc "hmac(crc32)" test vectors
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/6] crypto: crc32-generic - remove __crc32_le()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/6] crypto: crc32c-generic - remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/6] crypto: crc32-generic - use unaligned access macros when needed
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/6] crypto: crc32 cleanups and unkeyed tests
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2][RESEND] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Mark MORUS SIMD glue as x86-specific
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [cryptodev:master 68/69] crypto/morus640_glue.c:147:2: error: too few arguments to function 'kernel_fpu_begin'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: chtls - fix a missing-check bug
- From: Wenwen Wang <wang6495@xxxxxxx>
- Re: [PATCH 0/4] Add support for MORUS AEAD algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Add support for AEGIS AEAD algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx: fix spelling mistake: "seqeunce" -> "sequence"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: request to HW should wrap
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: n2: fix spelling mistake: "restesting" -> "retesting"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: log the crypto algorithm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH v6 07/28] x86/asm/crypto: annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 09/28] x86/asm: annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v6 27/28] x86_32/asm: change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- cryptomgr_test / drbg_ctr: BUG: sleeping function called from invalid context
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] fscrypt: log the crypto algorithm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: inside-secure - do not use memset on MMIO
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccree: drop signature register check
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Simon Horman <horms@xxxxxxxxxxxx>
- linux-next: WARNING: CPU: 0 PID: 41 at crypto/testmgr.c:3720 alg_test+0x117/0x520
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: reorder paes test lexicographically
- From: Abdul Haleem <abdhalee@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: ccree: drop signature register check
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/3] clk: renesas: r8a7795: Add ccree clock
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/3] arm64: dts: renesas: r8a7795: add ccree binding
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] enable ccree on Renesas R-Car platform
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [ANNOUNCE] Linux Security Summit Europe 2018 - CFP
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: inside-secure - rework cipher functions for future AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 06/10] crypto: inside-secure - fix the hash then encrypt/decrypt types
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 05/10] crypto: inside-secure - make the key and context size computation dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 09/10] crypto: inside-secure - authenc(hmac(sha224),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 08/10] crypto: inside-secure - authenc(hmac(sha256),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 00/10] crypto: inside-secure - AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 04/10] crypto: inside-secure - make the context control size dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 10/10] crypto: inside-secure - authenc(hmac(sha1),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 07/10] crypto: inside-secure - improve error reporting
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 01/10] crypto: inside-secure - remove VLAs
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2 03/10] crypto: inside-secure - rework the alg type settings in the context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: chtls: generic handling of data and hdr
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 2/5] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 1/5] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 0/5] build warnings cleanup
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 4/5] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 5/5] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH 3/5] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (3)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFC] crypto: Remove mcryptd
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- RE: [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: vmx - Remove overly verbose printk from AES XTS init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH resend 00/10] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: x86 - Add optimized MORUS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 2/4] crypto: testmgr - Add test vectors for MORUS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 3/4] crypto: Add common SIMD glue code for MORUS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 1/4] crypto: Add generic MORUS AEAD implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/4] Add support for MORUS AEAD algorithm
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 3/3] crypto: x86 - Add optimized AEGIS implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 2/3] crypto: testmgr - Add test vectors for AEGIS
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 1/3] crypto: Add generic AEGIS AEAD implementations
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH 0/3] Add support for AEGIS AEAD algorithm
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: reorder paes test lexicographically
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [next-20180509][bisected a794d8d] ppc boot warnings at crypto/testmgr.c:3720
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- Re: [PATCH v2] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH 08/18] random: Remove pr_fmt duplicate logging prefixes
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 00/18] Convert default pr_fmt from empty to KBUILD_MODNAME
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH -resend 08/27] x86: assembly, annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 06/27] x86: crypto, annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH -resend 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] crypto: chelsio: request to HW should wrap
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH RESEND 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCH RESEND 2/2] Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/11] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: DMA map buffer allocated in ahash_request_ctx
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- DMA map buffer allocated in ahash_request_ctx
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] crypto: nx: fix spelling mistake: "seqeunce" -> "sequence"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] hwrng: n2: fix spelling mistake: "restesting" -> "retesting"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: add Speck128/256 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v17 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v17 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: IV generation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: IV generation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: chtls - fix a missing-check bug
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 03/18] docs: */index.rst: Add newer documents to their respective index.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 11/18] docs: crypto_engine.rst: Fix two parse warnings
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 00/18] Fix some build warnings/errors with Sphinx
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- IV generation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: chtls - fix a missing-check bug
- From: Wenwen Wang <wang6495@xxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- [PATCH v2] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- Re: [PATCH] crypto: ghash-clmulni: fix spelling mistake: "acclerated" -> "accelerated"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix size of RSA prime factor q
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: Remove VLA usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Fix stm32-rng for default state and suspend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: implement SM4 for arm64 using special instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] cleanup and hardware keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] async_pq: Remove VLA usage
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] async_pq: Remove VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] async_pq: Remove VLA usage
- From: Kyle Spiers <ksspiers@xxxxxxxxxx>
- [PATCH 2/2] crypto: vmx - Remove overly verbose printk from AES XTS init
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: vmx - Remove overly verbose printk from AES init routines
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: "'Antoine Tenart'" <antoine.tenart@xxxxxxxxxxx>
- [PATCH 4.9.y, 4.14.y] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] Add GET_ID SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- [PATCH 1/2] Add DOWNLOAD_FIRMWARE SEV command
- From: Janakarajan Natarajan <Janakarajan.Natarajan@xxxxxxx>
- Re: [PATCH 1/5] random: fix crng_ready() test
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 02/10] crypto: inside-secure - rework cipher functions for future AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/10] crypto: inside-secure - make the context control size dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/10] crypto: inside-secure - authenc(hmac(sha224),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/10] crypto: inside-secure - authenc(hmac(sha1),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/10] crypto: inside-secure - authenc(hmac(sha256),cbc(aes)) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/10] crypto: inside-secure - rework the alg type settings in the context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/10] crypto: inside-secure - improve error reporting
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/10] crypto: inside-secure - AEAD support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/10] crypto: inside-secure - fix the hash then encrypt/decrypt types
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/10] crypto: inside-secure - make the key and context size computation dynamic
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/10] crypto: aead - allow to allocate AEAD requests on the stack
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: "Dey, Megha" <megha.dey@xxxxxxxxx>
- [PATCH v2 7/7] crypto: chtls: HW supported socket opt
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 6/7] crypto: chtls: generic handling of data and hdr
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 5/7] crypto: chtls: free beyond end rspq_skb_cache
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 4/7] crypto: chtls: kbuild warnings
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 3/7] crypto: chtls: dereference null variable
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 2/7] crypto:chtls: key len correction
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 1/7] crypto: chtls: wait for memory sendmsg, sendpage
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH resend 10/10] crypto: arm64/sha512-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 09/10] crypto: arm64/sha3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 08/10] crypto: arm64/crct10dif-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 07/10] crypto: arm64/crc32-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 06/10] crypto: arm64/aes-ghash - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 05/10] crypto: arm64/aes-bs - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 04/10] crypto: arm64/aes-blk - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 03/10] crypto: arm64/aes-ccm - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 02/10] crypto: arm64/sha2-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 01/10] crypto: arm64/sha1-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH resend 00/10] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v1 1/7] crypto: crypto4xx - performance optimizations
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH v1 1/7] crypto: crypto4xx - performance optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/61] crypto: simplify getting .drvdata
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham: fix memleak
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.17
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]