Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 01/21] ASoC: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 16/21] remoteproc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 03/21] crypto: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 00/21] Allow compile-testing NO_DMA (drivers)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/21] iio: adc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 07/21] i2c: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
- From: John Garry <john.garry@xxxxxxxxxx>
- [PATCH v2 09/21] iommu: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 13/21] mmc: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 02/21] ata: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 05/21] firewire: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 19/21] spi: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 12/21] media: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 06/21] fpga: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 20/21] staging: vc04_services: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 14/21] mtd: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 11/21] mailbox: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 15/21] net: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 21/21] usb: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 18/21] serial: Remove depends on HAS_DMA in case of platform dependency
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [bug report] crypto: omap-aes - Add support for GCM mode
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - fix IPsec cipher in length
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 02/12] crypto: inside-secure - move cache result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 03/12] crypto: inside-secure - wait for the request to complete if in the backlog
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 05/12] crypto: inside-secure - fix typo s/allways/always/ in a define
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 06/12] crypto: inside-secure - fix a typo in a register name
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 08/12] crypto: inside-secure - do not access buffers mapped to the device
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 09/12] crypto: inside-secure - improve the skcipher token
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 10/12] crypto: inside-secure - the context ipad/opad should use the state sz
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 11/12] crypto: inside-secure - hmac(sha256) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 04/12] crypto: inside-secure - move the digest to the request context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 12/12] crypto: inside-secure - hmac(sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 07/12] crypto: inside-secure - improve the send error path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 01/12] crypto: inside-secure - move hash result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: kbuild test robot <lkp@xxxxxxxxx>
- RE: [PATCH] crypto: ctr: avoid VLA use
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v2] crypto: ctr - avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/47] arch-removal: device drivers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- [PATCH] crypto: doc - Document remaining members in struct crypto_alg
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 19/47] crypto: remove blackfin CRC driver
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/47] arch-removal: device drivers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: ctr: avoid VLA use
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: ctr: avoid VLA use
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
- From: Leonard Crestez <leonard.crestez@xxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: add bindings doc for Keystone SA HWRNG driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH v2 0/2] Keystone2 HW random generator
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH v2 2/2] hw_random: keystone2: add hw_random driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 2/3] crypto: inside-secure - improve clock initialization
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - fix clock resource by adding a register clock
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - fix clock management
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure: improve clock management
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [EXTERNAL] Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [tpmdd-devel] in-kernel user of ecdsa
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- in-kernel user of ecdsa
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
- From: Vitaly Andrianov <vitalya@xxxxxx>
- Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/talitos: Adjustments for talitos_edesc_alloc()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 crypto 07/11] chtls: Program the TLS Key
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v10 crypto 08/11] chtls: CPL handler definition
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v10 crypto 09/11] chtls: Inline TLS request Tx/Rx
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v3 6/6] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] trusted keys: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/6] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 23/23] DO NOT MERGE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 22/23] crypto: arm64/sm3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 21/23] crypto: arm64/sha512-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 20/23] crypto: arm64/sha3-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 19/23] crypto: arm64/crct10dif-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 18/23] crypto: arm64/crc32-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 17/23] crypto: arm64/aes-ghash - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 16/23] crypto: arm64/aes-bs - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 15/23] crypto: arm64/aes-blk - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 14/23] crypto: arm64/aes-ccm - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 12/23] crypto: arm64/sha1-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 13/23] crypto: arm64/sha2-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 11/23] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 10/23] arm64: assembler: add utility macros to push/pop stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 09/23] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 08/23] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 07/23] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 06/23] crypto: arm64/aes-blk - remove configurable interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 05/23] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 04/23] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 03/23] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 01/23] crypto: testmgr - add a new test case for CRC-T10DIF
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 02/23] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC 0/5] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v10 crypto 10/11] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 11/11] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 09/11] chtls: Inline TLS request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 08/11] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 03/11] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 07/11] chtls: Program the TLS Key
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 06/11] chcr: Inline TLS Key Macros
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 05/11] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 04/11] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 02/11] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 01/11] tls: support for Inline tls record
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v10 crypto 00/11] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: Validate buffer lengths for copy operations
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp - Fill the result buffer only on digest, finup, and final ops
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] add crypto support for TPM communication
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Crypto:Chelsio: no csum offload for ipsec path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: omap: Fix clock resource for Armada 7K/8K
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: talitos - do not perform unnecessary dma synchronisation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: omap: fixes + tweaks for omap crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cavium: make two functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: inside-secure - fixes for heavy load usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH RFC 4/5] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/5] tls: RX path for ktls
- From: Boris Pismenny <borisp@xxxxxxxxxxxx>
- [PATCH RFC 4/5] tls: RX path for ktls
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 5/5] tls: Add receive path documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 1/5] tls: Generalize zerocopy_from_iter
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 3/5] tls: Pass error code explicitly to tls_err_abort
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 2/5] tls: Move cipher info to a separate struct
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH RFC 0/5] TLX Rx
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v9 crypto 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto/ecc: Remove stack VLA usage
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC v2 5/5] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 4/5] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 3/5] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 2/5] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 1/5] tpm-buf: create new functions for handling TPM buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/5] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/ecc: Remove stack VLA usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Paul Cercueil <paul@xxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto/ccp - Fill the result buffer only on digest, finup, and final ops
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto/ccp: Validate buffer lengths for copy operations
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v9 crypto 08/12] chtls: Key program
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: hash.h: Prevent use of req->result in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- [PATCH] crypto: virtio - remove dependency on CRYPTO_AUTHENC
- From: Peter Wu <peter@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Paul Cercueil <paul@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- RE: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- RE: [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Vakul Garg <vakul.garg@xxxxxxx>
- [PATCH v9 crypto 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v9 crypto 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash.h: Prevent use of req->digest in ahash update
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH 2/2] crypto: introduce SM4 testmgr tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: introduce SM4 symmetric cipher algorithm
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: introduce SM4 symmetric cipher algorithm
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: jz4780-rng: Add RNG node to jz4780.dtsi
- From: James Hogan <jhogan@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: chelsio - Cleanup and bug fixes
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 5/5] crypto:chelsio:Split Hash requests for large scatter gather list
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 4/5] crypto:chelsio: Fix iv passed in fallback path for rfc3686
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 3/5] crypto:chelsio: Update IV before sending request to HW
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 1/5] crypto:chelsio: Use kernel round function to align lengths
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 2/5] crypto:chelsio: Fix src buffer dma length
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH 1/2] Documentation: dt: rng: add bindings doc for Keystone SA HWRNG driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: rng: Document Freescale i.MX21 and i.MX31 RNGA compatibles
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: rng: Document Freescale i.MX21 and i.MX31 RNGA compatibles
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH v2 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH v2 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document Freescale i.MX31 RNGA compatible
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: Gary R Hook <gary.hook@xxxxxxx>
- [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v11 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 2/7] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v11 1/7] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC 0/2] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/2] add integrity and security to TPM2 transactions
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH][next] crypto: x86/des3_ede: make array des3_ede_skciphers static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: doc - clarify hash callbacks state machine
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: Why are we testing an intermediate result in ahash?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: omap-sham - Fix misleading indentation
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [crypto v8 04/12] chtls: structure and macro definiton
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/2] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Why are we testing an intermediate result in ahash?
- From: Gary R Hook <gary.hook@xxxxxxx>
- [cryptodev:master 109/128] arch/x86/crypto/des3_ede_glue.c:407:21: sparse: symbol 'des3_ede_skciphers' was not declared. Should it be static?
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [RFC PATCH cryptodev] crypto: des3_ede_skciphers[] can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] fscrypt: add Speck128/256 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 17/18] crypto: talitos - chain in buffered data for ahash on SEC1
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 17/18] crypto: talitos - chain in buffered data for ahash on SEC1
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] Enable CAAM on i.MX7s fix TrustZone issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/30] crypto: x86 glue code cleanup/conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] cleanups and new HW rev support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - Clean up redundant #include
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 4.4 12/34] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 24/56] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 050/115] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ecdh: fix to allow multi segment scatterlists
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: cfb: add support for Cipher FeedBack mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] add crypto support for TPM communication
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 2/4] crypto: omap-sham - Fix misleading indentation
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 4/4] crypto: s5p-sss - Constify pointed data (arguments and local variables)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 3/4] crypto: s5p-sss: Remove useless check for non-null request
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 1/4] crypto: omap-sham: Remove useless check for non-null request
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 0/2] Keystone2 HW random generator
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 2/2] hw_random: keystone2: add hw_random driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [PATCH 1/2] Documentation: dt: rng: add bindings doc for Keystone SA HWRNG driver
- From: Vitaly Andrianov <vitalya@xxxxxx>
- [crypto v8 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v8 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: ccp - protect RSA implementation from too large input data
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] Crypto:Chelsio: no csum offload for ipsec path
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH 5/5] KEYS: add KPP ecdh parser
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 4/5] KEYS: add asymmetric kpp subtype
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 3/5] KEYS: Provide missing asym kpp subops for new key type ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 2/5] KEYS: Provide keyctls to drive the new key type ops for kpp
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 1/5] KEYS: Provide key type operations for kpp ops
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 0/5] KEYS: add kpp keyctl operations
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: omap - Fix clock resource by adding a register clock
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 1/2] hwrng: omap - Remove useless test before clk_disable_unprepare
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- [PATCH 0/2] hwrng: omap: Fix clock resource for Armada 7K/8K
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH v4 4/4] ARM: dts: imx7s: add CAAM device node
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- [PATCH 1/4] crypto: bcm: Remove unused variable (char *tag_to_hash_idx[])
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: bcm: Move *aead_alg_name[] from spu.c to util.c. Constify too.
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: bcm: Constify *hash_alg_name[]
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: bcm: Constify variables in spu2.c
- From: Hernán Gonzalez <hernan@xxxxxxxxxxxxxxxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Gary R Hook <gary.hook@xxxxxxx>
- Can a driver->probe be called for two devices at the same time (WAS: Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs)
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: error in libkcapi 1.0.3 for aead aio
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 3/6] crypto: omap-sham: make fallback size configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 6/6] crypto: omap-aes: make queue length configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 5/6] crypto: omap-aes: make fallback size configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 4/6] crypto: omap-sham: make queue length configurable
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 1/6] crypto: omap-sham: Verify page zone of scatterlists before starting DMA
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 2/6] crypto: omap-crypto: Verify page zone scatterlists before starting DMA
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 0/6] crypto: omap: fixes + tweaks for omap crypto
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 1/2] dt-bindings: rng: Document Freescale i.MX31 RNGA compatible
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 2/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 1/2] crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 2/2] crypto: talitos - do not perform unnecessary dma synchronisation
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] hwrng: cavium: make two functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: ahash - scheduling whilst atomic.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- ahash - scheduling whilst atomic.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH 3/3] crypto: inside-secure - wait for the request to complete if in the backlog
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 0/3] crypto: inside-secure - fixes for heavy load usage
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 1/3] crypto: inside-secure - move hash result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- [PATCH 2/3] crypto: inside-secure - move cache result dma mapping to request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: "Hook, Gary" <ghook@xxxxxxx>
- [PATCH 5/5] crypto:chelsio:Split Hash requests for large scatter gather list
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 4/5] crypto:chelsio: Fix iv passed in fallback path for rfc3686
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/5] crypto:chelsio: Update IV before sending request to HW
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/5] crypto:chelsio: Fix src buffer dma length
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/5] crypto:chelsio: Use kernel round function to align lengths
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 0/5] crypto:chelsio: Bug fixes and cleanup
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- error in libkcapi 1.0.3 for aead aio
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/3] crypto: ccp - return an actual key size from RSA max_size callback
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: ccp - protect RSA implementation from too large input data
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] X.509: unpack RSA signatureValue field from BIT STRING
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [dm-devel] Integrity checking fails with Atmel SHA hw accelerator enabled
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: SVM: kbuild test robot warning fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH] crypto/ccp: don't disable interrupts while setting up debugfs
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [Crypto v7 03/12] tls: support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- RE: [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [Crypto v7 03/12] tls: support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [Crypto v7 00/12] Chelsio Inline TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
- Re: [PATCH] Remove useless assignment in rsa_verify
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable 1/2] crypto: hash - annotate algorithms taking optional key
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH -stable 2/2] crypto: hash - prevent using keyed hashes without setting key
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH -stable 1/2] crypto: hash - annotate algorithms taking optional key
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [Crypto v7 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix memdup.cocci warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: bcm: Delete an error message for a failed memory allocation in do_shash()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bfin_crc: Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] x86/crypto gcmaes SSE scatter/gather support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: Speck support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Remove useless assignment in rsa_verify
- From: C0deAi <techsupport@xxxxxxxxx>
- Re: [PATCH 0/2] crypto/sahara: Adjustments for sahara_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Ux500 crypto: Adjustments for ux500_cryp_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: inside-secure - stabilization and fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: bcm2835: Handle deferred clock properly
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] crypto: sunxi-ss: Add MODULE_ALIAS to sun4i-ss
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Crypto v7 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 2/4] crypto: caam - do not use mem and emi_slow clock for imx7x
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [Crypto v7 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v7 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 3/4] clk: imx7d: add CAAM clock
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- [Crypto v7 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v4 4/4] ARM: dts: imx7s: add CAAM device node
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: caam - Fix null dereference at error path
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- [PATCH v4 0/4] Enable CAAM on i.MX7s fix TrustZone issues
- From: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Alexandre Torgue <alexandre.torgue@xxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.16
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH 4.14, 4.9] crypto: talitos - fix Kernel Oops on hashing an empty file
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: AF_ALG AIO improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] crypto: ccp: add check to get PSP master only when PSP is detected
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 2/2] include: psp-sev: Capitalize invalid length enum
- From: "Hook, Gary" <ghook@xxxxxxx>
- Re: [PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- RE: [Crypto v6 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [Crypto v6 03/12] tls: support for inline tls
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 30/30] crypto: ablk_helper - remove ablk_helper
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 23/30] crypto: x86/camellia - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 24/30] crypto: x86/camellia - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 29/30] crypto: x86/glue_helper - rename glue_skwalk_fpu_begin()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 25/30] crypto: x86/camellia-aesni-avx,avx2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 26/30] crypto: xts - remove xts_crypt()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 28/30] crypto: x86/glue_helper - remove blkcipher_walk functions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 27/30] crypto: lrw - remove lrw_crypt()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 22/30] crypto: x86/camellia - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 21/30] crypto: x86/camellia-aesni-avx2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 15/30] crypto: x86/cast5-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 16/30] crypto: x86/cast6-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 17/30] crypto: x86/cast6-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 20/30] crypto: x86/camellia-aesni-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 19/30] crypto: x86/des3_ede - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 18/30] crypto: x86/blowfish: convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 12/30] crypto: x86/twofish-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 13/30] crypto: x86/twofish-avx - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 14/30] crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 11/30] crypto: x86/twofish-3way - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 10/30] crypto: x86/twofish-3way - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 06/30] crypto: x86/serpent-avx2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 09/30] crypto: x86/twofish-3way - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 08/30] crypto: x86/serpent-avx,avx2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 07/30] crypto: x86/serpent-avx - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 05/30] crypto: x86/serpent-sse2 - convert to skcipher interface
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 04/30] crypto: x86/serpent-sse2 - remove XTS algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 03/30] crypto: x86/serpent-sse2 - remove LRW algorithm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 02/30] crypto: x86/glue_helper - add skcipher_walk functions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 01/30] crypto: simd - allow registering multiple algorithms at once
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 00/30] crypto: x86 glue code cleanup/conversion
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 2/4] dt-bindings: Add DT bindings for ccree 710 and 630p
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 0/4] cleanups and new HW rev support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ccree: remove unused definitions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/4] dt-bindings: Add DT bindings for ccree 710 and 630p
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccree: add support for older HW revs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ccree: replace memset+kfree with kzfree
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Clean up redundant #include
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [Crypto v6 03/12] tls: support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 11/12] chtls: Register chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 02/12] ethtool: enable Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v6 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- [PATCH] crypto: ixp4xxx: Use dma_pool_zalloc()
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- [PATCH] Update Boris Brezillon email address
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [cryptodev:master 22/38] drivers/crypto/virtio/virtio_crypto_algs.c:494:9: error: implicit declaration of function 'crypto_transfer_cipher_request_to_engine'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [cryptodev:master 22/38] drivers/crypto/virtio/virtio_crypto_algs.c:494:9: error: implicit declaration of function 'crypto_transfer_cipher_request_to_engine'; did you mean 'crypto_transfer_skcipher_request_to_engine'?
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 2/2] include: psp-sev: Capitalize invalid length enum
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 1/2] crypto: ccp: Fix sparse, use plain integer as NULL pointer
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 9/38] drivers/crypto/ccree/cc_cipher.c:629:15-22: WARNING opportunity for kmemdep
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: fix memdup.cocci warnings
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: ccree: Introduce Arm TrustZone CryptoCell
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mcryptd - remove pointless wrapper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Crypto v5 03/12] support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: sha512-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-pkcs1pad: Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto_user: Replace GFP_ATOMIC with GFP_KERNEL in crypto_report
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC PATCH] KEYS: Use individual pages in big_key for crypto buffers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: chelsio - Make function aead_ccm_validate_input static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Make several functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Make function ccp_get_dma_chan_attr static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: stm32/cryp - add AEAD cipher algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Crypto v5 03/12] support for inline tls
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: stm32/hash: Correction to improve robustness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: caam/qi - return -EBADMSG for ICV check failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha256-mb - remove HASH_FIRST flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: add zBeWalgo compression for zram
- From: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH Resend 5/5] hwrng: stm32 - rework read timeout calculation
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH Resend 3/5] hwrng: stm32 - allow disable clock error detection
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 2/5] dt-bindings: rng: add reset node for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 4/5] dt-bindings: rng: add clock detection error for stm32
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 1/5] hwrng: stm32 - add reset during probe
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH Resend 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [Crypto v4 12/12] Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] chtls_netdev() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: atmel: Delete error messages for a failed memory allocation in six functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH 0/5] hwrng: stm32 - Improvement for stm32-rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam: Use common error handling code in four functions
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: caam: Delete an error message for a failed memory allocation in seven functions
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [Crypto v5 06/12] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 12/12] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 05/12] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 10/12] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 11/12] chtls: Register the chtls Inline TLS with net tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 08/12] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 09/12] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 07/12] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 04/12] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 03/12] support for inline tls
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 02/12] ethtool: feature for Inline TLS in HW
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 01/12] tls: tls_device struct to register TLS drivers
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [Crypto v5 00/12] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [Crypto v4 12/12] Makefile Kconfig
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: bcm: One function call less in do_shash() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: bcm: Delete an error message for a failed memory allocation in do_shash()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/bcm: Adjustments for do_shash()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: bfin_crc: Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] crypto: speck - add test vectors for Speck64-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 4/5] crypto: speck - add test vectors for Speck128-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 2/5] crypto: speck - export common helpers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: add support for the Speck block cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 0/5] crypto: Speck support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: caam: Use common error handling code in four functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: caam: Delete an error message for a failed memory allocation in seven functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/caam: Adjustments for eight function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/14] x86/crypto: aesni: Add GCM_INIT macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 05/14] x86/crypto: aesni: Merge encode and decode to GCM_ENC_DEC macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 04/14] x86/crypto: aesni: Add GCM_COMPLETE macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 07/14] x86/crypto: aesni: Split AAD hash calculation to separate macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 06/14] x86/crypto: aesni: Introduce gcm_context_data
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 08/14] x86/crypto: aesni: Fill in new context data structures
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 09/14] x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 13/14] x86/crypto: aesni: Introduce scatter/gather asm function stubs
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 12/14] x86/crypto: aesni: Add fast path for > 16 byte update
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 11/14] x86/crypto: aesni: Introduce partial block macro
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 10/14] x86/crypto: aesni: Move HashKey computation from stack to gcm_context
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 02/14] x86/crypto: aesni: Macro-ify func save/restore
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 01/14] x86/crypto: aesni: Merge INITIAL_BLOCKS_ENC/DEC
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 00/14] x86/crypto gcmaes SSE scatter/gather support
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] crypto: nx-842: Delete an error message for a failed memory allocation in nx842_pseries_init()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] crypto: virtio: convert to new crypto engine API
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 2/2] crypto: omap: Improve a size determination in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: omap: Delete an error message for a failed memory allocation in three functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/omap: Adjustments for three function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: James Hogan <jhogan@xxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: Improve a size determination in sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: sahara: Delete an error message for a failed memory allocation in sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] crypto: engine - Permit to enqueue all async requests
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- [PATCH 0/2] crypto/sahara: Adjustments for sahara_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]