Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v2 1/2] crypto: ccree: enable support for hardware keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 7/7] chtls: handling HW supported sockopt
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: <yael.chemla@xxxxxxxxxxxx>
[PATCH 6/7] chtls: generic handling for data and header
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 5/7] chtls: free beyond end of array rspq_skb_cache
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 4/7] chtls: kbuild warnings
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 3/7] chtls: variable dereferenced before null check
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 2/7] chtls: support only 128b key length
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 1/7] chtls: wait for memory in Tx path
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: Samuel Neves <samuel.c.p.neves@xxxxxxxxx>
Re: [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 2/2] crypto: arm64 - add support for SM4 encryption using special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 0/2] crypto: implement SM4 for arm64 using special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 1/2] crypto: sm4 - export encrypt/decrypt routines to other drivers
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: "Dey, Megha" <megha.dey@xxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: Jeffrey Walton <noloader@xxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: Paul Crowley <paulcrowley@xxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] crypto: remove Speck
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Question on random.c add_interrupt_randomness function
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH] crypto: remove Speck
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2 0/5] crypto: Speck support
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Question on random.c add_interrupt_randomness function
From
: Harald Freudenberger <freude@xxxxxxxxxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: GCM and XTS: kcapi result not matching with NIST vectors
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 2/2] hwrng: stm32-rng - fix pm_suspend issue
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 0/2] Fix stm32-rng for default state and suspend
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 1/2] hwrng: stm32 - define default state for rng driver
From
: Lionel Debieve <lionel.debieve@xxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: ccree: limit build to plausible archs
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH] crypto: ccree: limit build to plausible archs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: WARNING: kernel stack regs at (ptrval) in syzkaller has bad 'bp' value (ptrval)
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: GCM and XTS: kcapi result not matching with NIST vectors
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH v2 0/2] cleanup and hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 1/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 2/2] crypto: ccree: use proper printk format
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
GCM and XTS: kcapi result not matching with NIST vectors
From
: Jitendra Lulla <lulla.jitendra@xxxxxxxxx>
Re: [PATCH v16 2/7] parisc: iomap: introduce io{read|write}64
From
: Helge Deller <deller@xxxxxx>
[PATCH] crypto/nx: Initialize 842 high and normal RxFIFO control registers
From
: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
[PATCH v16 2/7] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 0/7] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v16 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] hwrng: via-rng - support new Centaur CPU
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: api - fix finding algorithm currently being tested
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: caam: - Use kmemdup() function
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: caam - strip input zeros from RSA input buffer
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: drbg - set freed buffers to NULL
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - Remove unneeded error assignment
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: Allow different compression results
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH][next] crypto: chtls: don't leak information from the stack to userspace
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto : chtls_cm - Fix potential NULL pointer dereferences
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH][next] crypto: chtls: remove redundant assignment to cdev->ports
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: Allow different compression results
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: removing various VLAs
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] crypto: caam - staticize caam_get_era()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/5] ThunderX ZIP driver bug fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/2] crypto: authencesn - don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] crypto: authenc - don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Actually remove stack VLA usage
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: caam - IV-related fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 0/5] add compression algorithm zBeWalgo
From
: Minchan Kim <minchan@xxxxxxxxxx>
Re: [PATCH 06/61] crypto: simplify getting .drvdata
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: WARNING: kernel stack frame pointer has bad value
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
[PATCH v1 1/7] crypto: crypto4xx - performance optimizations
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 6/7] crypto: crypto4xx - extend aead fallback checks
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 7/7] crypto: crypto4xx - put temporary dst sg into request ctx
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 2/7] crypto: crypto4xx - convert to skcipher
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 3/7] crypto: crypto4xx - avoid VLA use
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 5/7] crypto: crypto4xx - properly set IV after de- and encrypt
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 4/7] crypto: crypto4xx - add aes-ctr support
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[RESEND PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
[PATCH 06/61] crypto: simplify getting .drvdata
From
: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
[PATCH 00/61] tree-wide: simplify getting .drvdata
From
: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: Allow different compression results
From
: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: Allow different compression results
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: "Dey, Megha" <megha.dey@xxxxxxxxx>
Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH] crypto: omap-sham: fix memleak
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH v3 18/20] spi: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH] crypto: omap-sham: fix memleak
From
: Bin Liu <b-liu@xxxxxx>
[PATCH v3 17/20] serial: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 13/20] mmc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 19/20] staging: vc04_services: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 05/20] firewire: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 12/20] media: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 07/20] i2c: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 14/20] mtd: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 06/20] fpga: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
RE: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: "Dey, Megha" <megha.dey@xxxxxxxxx>
[PATCH v3 16/20] remoteproc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 02/20] ata: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 00/20] Allow compile-testing NO_DMA (drivers)
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 11/20] mailbox: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH/RFC] crypto: Add platform dependencies for CRYPTO_DEV_CCREE
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 03/20] crypto: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 09/20] iommu: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 15/20] net: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 01/20] ASoC: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 04/20] fbdev: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 20/20] usb: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 10/20] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 08/20] iio: adc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: caam: - Use kmemdup() function
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH] crypto: api - fix finding algorithm currently being tested
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: caam - strip input zeros from RSA input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Yann Collet <cyan@xxxxxx>
[PATCH v2] crypto: caam: - Use kmemdup() function
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Actually remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH] crypto: caam: - Use kmemdup() function
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: caam: - Use kmemdup() function
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH] crypto: caam: - Use kmemdup() function
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
[PATCH] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 2/2] ARM: bcm283x: Add missing interrupt for RNG block
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 1/2] dt-binding: rng: Add interrupt property for BCM2835
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH v7 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH] hwrng: via-rng - support new Centaur CPU
From
: David Wang <davidwang@xxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 2/5] random: use a different mixing algorithm for add_device_randomness()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 4/5] random: crng_reseed() should lock the crng instance that it is modifying
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 5/5] random: add new ioctl RNDRESEEDCRNG
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Breno Matheus Lima <brenomatheus@xxxxxxxxx>
libkcapi v1.1.0 released
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH] crypto: drbg - set freed buffers to NULL
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] crypto: rsa - Remove unneeded error assignment
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH] crypto: testmgr: Allow different compression results
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: [PATCH] crypto: drbg - set freed buffers to NULL
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
RE: [PATCH v2 0/2] crypto: removing various VLAs
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH] crypto: drbg - set freed buffers to NULL
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v4 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: "Bryan O'Donoghue" <bryan.odonoghue@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
[ANNOUNCE] Linux Security Summit North America 2018 - CFP
From
: James Morris <jmorris@xxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: removing various VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 1/5] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 0/5] ThunderX ZIP driver bug fixes
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 5/5] crypto: thunderx_zip: Fix smp_processor_id() warnings
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 4/5] crypto: thunderx_zip: Fix statistics pending request value
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 3/5] crypto: thunderx_zip: Prevent division by zero
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 2/5] crypto: thunderx_zip: Limit result reading attempts
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 0/2] crypto: removing various VLAs
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 6/6] crypto: cfb - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 4/6] crypto: pcbc - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 5/6] crypto: cts - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 1/2] crypto: api - laying defines and checks for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 0/2] crypto: removing various VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 2/2] crypto: remove several VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] AF_ALG: register completely initialized request in list
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] AF_ALG: register completely initialized request in list
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: INFO: task hung in exit_aio
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [RFC 0/2] add integrity and security to TPM2 transactions
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
[PATCH] AF_ALG: register completely initialized request in list
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
KMSAN: uninit-value in af_alg_free_areq_sgls
From
: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 4/6] crypto: pcbc - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 5/6] crypto: cts - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 6/6] crypto: cfb - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH][next] crypto: chtls: remove redundant assignment to cdev->ports
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH][next] crypto: chtls: don't leak information from the stack to userspace
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [RESEND] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Crypto Update for 4.17
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[bug report] crypto: chtls - Program the TLS session Key
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Register chtls with net tls
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Rx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [crypto-chtls] Supicious code in chtls_io
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [v3] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
[crypto-chtls] Supicious code in chtls_io
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [v3] crypto: ctr - avoid VLA use
From
: Laura Abbott <labbott@xxxxxxxxxx>
[PATCH] crypto : chtls_cm - Fix potential NULL pointer dereferences
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
RE: Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v3 1/2] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v15 net-next 01/12] tls: support for Inline tls record
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v15 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 11/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 07/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
[RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH 1/2] crypto: ccree: remove unused enums
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/9] crypto: don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] crypto/ecc: Actually remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Ganesh Goudar <ganeshgr@xxxxxxxxxxx>
[v3] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
[PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH] sunrpc: remove incorrect HMAC request initialization
From
: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Joe Perches <joe@xxxxxxxxxxx>
[PATCH] sunrpc: remove incorrect HMAC request initialization
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
[PATCH 3/3] crypto: caam/qi - fix IV DMA mapping and updating
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 2/3] crypto: caam - fix IV DMA mapping and updating
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 1/3] crypto: caam - fix DMA mapping dir for generated IV
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 0/3] crypto: caam - IV-related fixes
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Stefan Agner <stefan@xxxxxxxx>
[PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH 2/2] crypto: thunderx_zip: Limit result reading attempts
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [SPAMMY (6.9)]Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 9/9] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 2/9] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 7/9] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 1/9] iomap: Use non-raw io functions for io{read|write}XXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 6/9] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 8/9] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 3/9] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 4/9] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 5/9] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
[PATCH v13 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
RE: [PATCH] omap-aes - fix crypto cleanup
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
RE: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
Re: [RESEND] SHASH_DESC_ON_STACK macro
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: <yael.chemla@xxxxxxxxxxxx>
RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: <yael.chemla@xxxxxxxxxxxx>
Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 07/10] kbuild: clean up *-asn1.[ch] patterns from top-level Makefile
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
Re: [PATCH 08/10] kbuild: rename *-asn1.[ch] to *.asn.[ch]
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
Re: [PATCH 06/10] .gitignore: move *-asn1.[ch] patterns to the top-level .gitignore
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
[PATCH v3] crypto: ecc: Remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: in-kernel user of ecdsa
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v6 04/12] ima: Introduce is_ima_sig()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 11/12] ima: Implement support for module-style appended signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 12/12] ima: Write modsig to the measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: rsa - remove unneeded initializations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v6 0/5] add compression algorithm zBeWalgo
From
: Minchan Kim <minchan@xxxxxxxxxx>
[PATCH v6 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/2] crypto: ccree: cleanup and hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 1/2] crypto: ccree: remove unused enums
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2] crypto: ahash - Fix early termination in hash walk
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: ahash - Fix early termination in hash walk
From
: Eli Cooper <elicooper@xxxxxxx>
Re: [PATCH v2] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Stefan Agner <stefan@xxxxxxxx>
[RESEND] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: inside-secure: improve clock management
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
Re: [PATCH v2 net-next 0/6] TLS Rx
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: doc - Document remaining members in struct crypto_alg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 19/47] crypto: remove blackfin CRC driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] Keystone2 HW random generator
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: inside-secure: improve clock management
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
Re: [PATCH] omap-aes - fix crypto cleanup and IV reporting
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
[RFC PATCH v5 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 8/9] crypto: qat - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 5/9] crypto: chcr - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 2/9] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 0/9] crypto: don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
From
: kbuild test robot <lkp@xxxxxxxxx>
[RFC PATCH] crypto: zbewalgo_stat_combination[] can be static
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: lrw - Free rctx->ext with kzfree
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
[PATCH v14 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 03/10] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v2 net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 6/6] tls: Add receive path documentation
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 3/6] tls: Pass error code explicitly to tls_err_abort
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 1/6] tls: Generalize zerocopy_from_iter
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 0/6] TLS Rx
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 4/6] tls: Refactor variable names
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 2/6] tls: Move cipher info to a separate struct
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH 0/9] don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] omap-aes - fix crypto cleanup and IV reporting
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
[PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Christophe LEROY <christophe.leroy@xxxxxx>
[PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Christophe Leroy <christophe.leroy@xxxxxx>
Re: [PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Jamie Iles <jamie@xxxxxxxxxxxxx>
Re: [PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Christophe LEROY <christophe.leroy@xxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
[PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 8/9] crypto: qat - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 5/9] crypto: chcr - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 2/9] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 0/9] don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v13 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 02/10] iomap: Fix sparse endian check warnings
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 03/10] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[RFC] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH net-next 5/6] tls: RX path for ktls
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
[PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
[PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH net-next 4/6] tls: Refactor variable names
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 6/6] tls: Add receive path documentation
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 3/6] tls: Pass error code explicitly to tls_err_abort
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 1/6] tls: Generalize zerocopy_from_iter
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 2/6] tls: Move cipher info to a separate struct
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 0/6] TLS Rx
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: kbuild test robot <lkp@xxxxxxxxx>
[RFC PATCH] tls: create_ctx() can be static
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH 5/5 v4] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 3/5 v4] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 4/5 v4] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
crypto: api - Keep failed instances alive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: api - Make crypto_alg_lookup static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: api - Remove unused crypto_type lookup function
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 00/12] Chelsio Inline TLS
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 6/9] crypto: inside-secure - improve the skcipher token
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 4/9] crypto: inside-secure - improve the send error path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 3/9] crypto: inside-secure - fix a typo in a register name
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 5/9] crypto: inside-secure - do not access buffers mapped to the device
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 7/9] crypto: inside-secure - the context ipad/opad should use the state sz
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 9/9] crypto: inside-secure - hmac(sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 2/9] crypto: inside-secure - fix typo s/allways/always/ in a define
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 8/9] crypto: inside-secure - hmac(sha256) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 1/9] crypto: inside-secure - move the digest to the request context
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
RE: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Madalin-cristian Bucur <madalin.bucur@xxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Matias Bjørling <mb@xxxxxxxxxxx>
Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
Re: [PATCH v11 crypto 01/12] tls: support for Inline tls record (fwd)
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig (fwd)
From
: Julia Lawall <julia.lawall@xxxxxxx>
[PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
From
: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
RE: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 11/12] crypto: inside-secure - hmac(sha256) support
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 00/12] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 04/12] ima: Introduce is_ima_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 01/12] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 00/12] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 09/12] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 11/12] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 12/12] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 10/12] ima: Add functions to read and verify a modsig signature
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 08/12] ima: Export func_tokens
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
Re: [PATCH][next] crypto: x86/des3_ede: make array des3_ede_skciphers static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: virtio - remove dependency on CRYPTO_AUTHENC
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto/ccp: Validate buffer lengths for copy operations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: hash.h: Prevent use of req->result in ahash update
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] crypto: introduce SM4 symmetric cipher algorithm
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]