Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v3 04/20] fbdev: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 20/20] usb: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 10/20] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v3 08/20] iio: adc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: caam: - Use kmemdup() function
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH] crypto: api - fix finding algorithm currently being tested
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: caam - strip input zeros from RSA input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Yann Collet <cyan@xxxxxx>
[PATCH v2] crypto: caam: - Use kmemdup() function
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Actually remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH] crypto: caam: - Use kmemdup() function
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: caam: - Use kmemdup() function
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH] crypto: caam: - Use kmemdup() function
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND] crypto: caam - strip input zeros from RSA input buffer
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: caam: Drop leading zero from input buffer
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
[PATCH] crypto: caam: Drop leading zero from input buffer
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 2/2] ARM: bcm283x: Add missing interrupt for RNG block
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 1/2] dt-binding: rng: Add interrupt property for BCM2835
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH v7 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH] hwrng: via-rng - support new Centaur CPU
From
: David Wang <davidwang@xxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 1/5] random: fix crng_ready() test
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 1/5] random: fix crng_ready() test
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 2/5] random: use a different mixing algorithm for add_device_randomness()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 3/5] random: set up the NUMA crng instances after the CRNG is fully initialized
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 4/5] random: crng_reseed() should lock the crng instance that it is modifying
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH 5/5] random: add new ioctl RNDRESEEDCRNG
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Breno Matheus Lima <brenomatheus@xxxxxxxxx>
libkcapi v1.1.0 released
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH] crypto: drbg - set freed buffers to NULL
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] crypto: rsa - Remove unneeded error assignment
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH] crypto: testmgr: Allow different compression results
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: [PATCH] crypto: drbg - set freed buffers to NULL
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
RE: [PATCH v2 0/2] crypto: removing various VLAs
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH] crypto: drbg - set freed buffers to NULL
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH v4 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v4 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v3 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH 0/5] KEYS: add kpp keyctl operations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2 2/2] crypto: caam - allow retrieving 'era' from register
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2 1/2] crypto: caam - staticize caam_get_era()
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: "Bryan O'Donoghue" <bryan.odonoghue@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
[ANNOUNCE] Linux Security Summit North America 2018 - CFP
From
: James Morris <jmorris@xxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] crypto: removing various VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 1/5] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 0/5] ThunderX ZIP driver bug fixes
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 5/5] crypto: thunderx_zip: Fix smp_processor_id() warnings
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 4/5] crypto: thunderx_zip: Fix statistics pending request value
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 3/5] crypto: thunderx_zip: Prevent division by zero
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH v2 2/5] crypto: thunderx_zip: Limit result reading attempts
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 0/2] crypto: removing various VLAs
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 6/6] crypto: cfb - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 4/6] crypto: pcbc - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 5/6] crypto: cts - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 1/2] crypto: api - laying defines and checks for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 0/2] crypto: removing various VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH v2 2/2] crypto: remove several VLAs
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
CAAM and IMA/EVM : caam_rsa_enc: DECO: desc idx 7: Protocol Size Error
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] AF_ALG: register completely initialized request in list
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] AF_ALG: register completely initialized request in list
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: INFO: task hung in exit_aio
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: DRBG - guard uninstantion by lock
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
[PATCH] crypto: DRBG - guard uninstantion by lock
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [RFC 0/2] add integrity and security to TPM2 transactions
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
[PATCH] AF_ALG: register completely initialized request in list
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: WARNING in kmem_cache_free
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
KMSAN: uninit-value in af_alg_free_areq_sgls
From
: syzbot <syzbot+9c251bdd09f83b92ba95@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/6] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/6] crypto: api - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH 1/6] crypto: api - laying macros for statically allocated buffers
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 4/6] crypto: pcbc - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 3/6] crypto: api - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 5/6] crypto: cts - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 6/6] crypto: cfb - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 2/6] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH 0/6] Remove several VLAs in the crypto subsystem
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[PATCH][next] crypto: chtls: remove redundant assignment to cdev->ports
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH][next] crypto: chtls: don't leak information from the stack to userspace
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [RESEND] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jan.glauber@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Crypto Update for 4.17
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[bug report] crypto: chtls - Program the TLS session Key
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Register chtls with net tls
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Rx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[bug report] crypto: chtls - Inline TLS record Tx
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [crypto-chtls] Supicious code in chtls_io
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [v3] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
[crypto-chtls] Supicious code in chtls_io
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [v3] crypto: ctr - avoid VLA use
From
: Laura Abbott <labbott@xxxxxxxxxx>
[PATCH] crypto : chtls_cm - Fix potential NULL pointer dereferences
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
RE: Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v3 1/2] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v15 net-next 01/12] tls: support for Inline tls record
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
Re: [PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v15 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 11/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 07/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v2] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [Cocci] [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
[RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH 1/2] crypto: ccree: remove unused enums
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/9] crypto: don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - remove unneeded initializations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] crypto/ecc: Actually remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Ganesh Goudar <ganeshgr@xxxxxxxxxxx>
[v3] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
[PATCH v14 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v14 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH] sunrpc: remove incorrect HMAC request initialization
From
: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Joe Perches <joe@xxxxxxxxxxx>
[PATCH] sunrpc: remove incorrect HMAC request initialization
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] crypto: cavium: zip: Remove unnecessary parentheses
From
: Varsha Rao <rvarsha016@xxxxxxxxx>
[PATCH 3/3] crypto: caam/qi - fix IV DMA mapping and updating
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 2/3] crypto: caam - fix IV DMA mapping and updating
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 1/3] crypto: caam - fix DMA mapping dir for generated IV
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 0/3] crypto: caam - IV-related fixes
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Stefan Agner <stefan@xxxxxxxx>
[PATCH] crypto: chelsio: move chcr_ahash_continue declation out of header
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 1/2] crypto: thunderx_zip: Fix fallout from CONFIG_VMAP_STACK
From
: Jan Glauber <jglauber@xxxxxxxxxx>
[PATCH 2/2] crypto: thunderx_zip: Limit result reading attempts
From
: Jan Glauber <jglauber@xxxxxxxxxx>
Re: [RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [SPAMMY (6.9)]Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v15 9/9] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 2/9] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 7/9] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 1/9] iomap: Use non-raw io functions for io{read|write}XXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 6/9] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 8/9] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 3/9] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 4/9] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v15 5/9] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
[PATCH v13 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v13 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
RE: [PATCH] omap-aes - fix crypto cleanup
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
RE: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
Re: [RESEND] SHASH_DESC_ON_STACK macro
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: <yael.chemla@xxxxxxxxxxxx>
RE: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: <yael.chemla@xxxxxxxxxxxx>
Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [dm-devel] [PATCH 2/2] md: dm-verity: allow parallel processing of bio blocks
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 07/10] kbuild: clean up *-asn1.[ch] patterns from top-level Makefile
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
Re: [PATCH 08/10] kbuild: rename *-asn1.[ch] to *.asn.[ch]
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
Re: [PATCH 06/10] .gitignore: move *-asn1.[ch] patterns to the top-level .gitignore
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
[PATCH v3] crypto: ecc: Remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: in-kernel user of ecdsa
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v6 04/12] ima: Introduce is_ima_sig()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 11/12] ima: Implement support for module-style appended signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 12/12] ima: Write modsig to the measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: rsa - remove unneeded initializations
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v6 0/5] add compression algorithm zBeWalgo
From
: Minchan Kim <minchan@xxxxxxxxxx>
[PATCH v6 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v6 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/2] crypto: ccree: cleanup and hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 1/2] crypto: ccree: remove unused enums
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/2] crypto: ccree: enable support for hardware keys
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2] crypto: ahash - Fix early termination in hash walk
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: ahash - Fix early termination in hash walk
From
: Eli Cooper <elicooper@xxxxxxx>
Re: [PATCH v2] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
[RFC PATCH] crypto: brcm - explicitly cast cipher to hash type
From
: Stefan Agner <stefan@xxxxxxxx>
[RESEND] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: inside-secure: improve clock management
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
Re: [PATCH v2 net-next 0/6] TLS Rx
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: doc - Document remaining members in struct crypto_alg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 19/47] crypto: remove blackfin CRC driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] Keystone2 HW random generator
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: inside-secure: improve clock management
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: ctr - avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] X.509: unpack RSA signatureValue field from BIT STRING
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
Re: [PATCH] omap-aes - fix crypto cleanup and IV reporting
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Tero Kristo <t-kristo@xxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Vaneet Narang <v.narang@xxxxxxxxxxx>
[RFC PATCH v5 2/5] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 4/5] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 3/5] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 0/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 1/5] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 5/5] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 8/9] crypto: qat - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 5/9] crypto: chcr - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 2/9] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v2 0/9] crypto: don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
From
: kbuild test robot <lkp@xxxxxxxxx>
[RFC PATCH] crypto: zbewalgo_stat_combination[] can be static
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: lrw - Free rctx->ext with kzfree
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
[PATCH v14 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 02/10] iomap: Add big endian sparse annotations to mmio_{read|write}XXbe()
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 03/10] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v14 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v2 net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 6/6] tls: Add receive path documentation
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 3/6] tls: Pass error code explicitly to tls_err_abort
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 1/6] tls: Generalize zerocopy_from_iter
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 0/6] TLS Rx
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 4/6] tls: Refactor variable names
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH v2 net-next 2/6] tls: Move cipher info to a separate struct
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH 0/9] don't leak pointers to authenc keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] omap-aes - fix crypto cleanup and IV reporting
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
[PATCH] omap-crypto - fix kernel oops and output buffer update
From
: Francis Le Bourse <francis.lebourse@xxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Christophe LEROY <christophe.leroy@xxxxxx>
[PATCH v2] crypto: talitos - fix IPsec cipher in length
From
: Christophe Leroy <christophe.leroy@xxxxxx>
Re: [PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Jamie Iles <jamie@xxxxxxxxxxxxx>
Re: [PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Christophe LEROY <christophe.leroy@xxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH] crypto: Add zstd support
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[RESEND PATCH] crypto: Add zstd support
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Nick Terrell <terrelln@xxxxxx>
Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: [PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
[PATCH v1] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH 9/9] crypto: talitos - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 8/9] crypto: qat - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 7/9] crypto: picoxcell - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 6/9] crypto: ixp4xx - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 5/9] crypto: chcr - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 4/9] crypto: caam/qi - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 3/9] crypto: caam - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 2/9] crypto: authencesn - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 0/9] don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH 1/9] crypto: authenc - don't leak pointers to authenc keys
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH v13 09/10] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 06/10] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 08/10] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 02/10] iomap: Fix sparse endian check warnings
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 05/10] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 07/10] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 10/10] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 03/10] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 04/10] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 00/10] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v13 01/10] iomap: Use correct endian conversion function in mmio_writeXXbe
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[RFC] SHASH_DESC_ON_STACK macro
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [PATCH] crypto: atmel-aes - fix the keys zeroing on errors
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
Re: [PATCH net-next 5/6] tls: RX path for ktls
From
: Boris Pismenny <borisp@xxxxxxxxxxxx>
[PATCH 0/1] cover-letter/lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
[PATCH 1/1] lz4: Implement lz4 with dynamic offset length.
From
: Maninder Singh <maninder1.s@xxxxxxxxxxx>
Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH net-next 4/6] tls: Refactor variable names
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 6/6] tls: Add receive path documentation
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 5/6] tls: RX path for ktls
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 3/6] tls: Pass error code explicitly to tls_err_abort
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 1/6] tls: Generalize zerocopy_from_iter
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 2/6] tls: Move cipher info to a separate struct
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH net-next 0/6] TLS Rx
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: kbuild test robot <lkp@xxxxxxxxx>
[RFC PATCH] tls: create_ctx() can be static
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH 5/5 v4] crypto: add flag for unstable encoding
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 3/5 v4] crypto: add unsafe decompression to api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 4/5 v4] crypto: configurable compression level
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/5 v4] crypto: add zBeWalgo to crypto-api
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/5 v4] add compression algorithm zBeWalgo
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
crypto: api - Keep failed instances alive
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: api - Make crypto_alg_lookup static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
crypto: api - Remove unused crypto_type lookup function
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v12 net-next 00/12] Chelsio Inline TLS
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v12 net-next 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v12 net-next 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH 1/1] crypto:chelsio - Remove declaration of static function from header
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 6/9] crypto: inside-secure - improve the skcipher token
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 4/9] crypto: inside-secure - improve the send error path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 3/9] crypto: inside-secure - fix a typo in a register name
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 5/9] crypto: inside-secure - do not access buffers mapped to the device
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 7/9] crypto: inside-secure - the context ipad/opad should use the state sz
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 9/9] crypto: inside-secure - hmac(sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 2/9] crypto: inside-secure - fix typo s/allways/always/ in a define
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 8/9] crypto: inside-secure - hmac(sha256) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 0/9] crypto: inside-secure - hmac(sha256/sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH v2 1/9] crypto: inside-secure - move the digest to the request context
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Horia Geantă <horia.geanta@xxxxxxx>
RE: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Madalin-cristian Bucur <madalin.bucur@xxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Matias Bjørling <mb@xxxxxxxxxxx>
Re: [PATCH v12 1/9] iomap: Fix sparse endian check warnings
From
: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
Re: [PATCH v11 crypto 01/12] tls: support for Inline tls record (fwd)
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig (fwd)
From
: Julia Lawall <julia.lawall@xxxxxxx>
[PATCH] crypto: cavium: cpt: Replace mdelay with msleep in cpt_device_init
From
: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
RE: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 11/12] crypto: inside-secure - hmac(sha256) support
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v6 00/12] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 04/12] ima: Introduce is_ima_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 03/12] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 01/12] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 00/12] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 05/12] integrity: Introduce integrity_keyring_from_id()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 07/12] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 09/12] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 11/12] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 12/12] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 10/12] ima: Add functions to read and verify a modsig signature
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 08/12] ima: Export func_tokens
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 06/12] integrity: Introduce asymmetric_sig_has_known_key()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v6 02/12] PKCS#7: Introduce pkcs7_get_message_sig() and verify_pkcs7_message_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
Re: [PATCH][next] crypto: x86/des3_ede: make array des3_ede_skciphers static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v11 crypto 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 01/12] tls: support for Inline tls record
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 02/12] ethtool: enable Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 03/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 04/12] cxgb4: LLD driver changes to support TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 05/12] crypto: chcr - Inline TLS Key Macros
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 07/12] crypto: chtls - Program the TLS session Key
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 08/12] crypto : chtls - CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 10/12] crypto: chtls - Inline TLS record Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 09/12] crypto: chtls - Inline TLS record Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 12/12] crypto: chtls - Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v11 crypto 11/12] crypto: chtls - Register chtls with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto/ecc: Remove stack VLA usage
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: virtio - remove dependency on CRYPTO_AUTHENC
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto/ccp: Validate buffer lengths for copy operations
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: hash.h: Prevent use of req->result in ahash update
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccp: Use memdup_user() rather than duplicating its implementation
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] crypto: introduce SM4 symmetric cipher algorithm
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/5] crypto:chelsio: Bug fixes and cleanup
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] hwrng: mxc-rnga - add driver support on boards with device tree
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v12 8/9] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 9/9] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 6/9] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 0/9] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 3/9] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 2/9] parisc: iomap: introduce io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 1/9] iomap: Fix sparse endian check warnings
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 5/9] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 4/9] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v12 7/9] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v11 crypto 06/12] crypto: chtls - structure and macro for Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v2 04/21] fbdev: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 01/21] ASoC: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH] crypto: doc - clarify hash callbacks state machine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 16/21] remoteproc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 03/21] crypto: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 00/21] Allow compile-testing NO_DMA (drivers)
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 10/21] lightnvm: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 08/21] iio: adc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 07/21] i2c: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
From
: John Garry <john.garry@xxxxxxxxxx>
[PATCH v2 09/21] iommu: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 13/21] mmc: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 02/21] ata: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2 05/21] firewire: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 19/21] spi: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 12/21] media: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 06/21] fpga: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 20/21] staging: vc04_services: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 14/21] mtd: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 11/21] mailbox: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 17/21] scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 15/21] net: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 21/21] usb: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH v2 18/21] serial: Remove depends on HAS_DMA in case of platform dependency
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[bug report] crypto: omap-aes - Add support for GCM mode
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH] crypto: talitos - fix IPsec cipher in length
From
: Christophe LEROY <christophe.leroy@xxxxxx>
Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] crypto: talitos - fix IPsec cipher in length
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 02/12] crypto: inside-secure - move cache result dma mapping to request
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 03/12] crypto: inside-secure - wait for the request to complete if in the backlog
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 05/12] crypto: inside-secure - fix typo s/allways/always/ in a define
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 06/12] crypto: inside-secure - fix a typo in a register name
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 08/12] crypto: inside-secure - do not access buffers mapped to the device
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 09/12] crypto: inside-secure - improve the skcipher token
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 10/12] crypto: inside-secure - the context ipad/opad should use the state sz
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 11/12] crypto: inside-secure - hmac(sha256) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 04/12] crypto: inside-secure - move the digest to the request context
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 12/12] crypto: inside-secure - hmac(sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 07/12] crypto: inside-secure - improve the send error path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 00/12] crypto: inside-secure - hmac(sha256/sha224) support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 01/12] crypto: inside-secure - move hash result dma mapping to request
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [Blackfin removal] [PATCH 18/28] crypto: Remove Blackfin crypto support
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: kbuild test robot <lkp@xxxxxxxxx>
RE: [PATCH] crypto: ctr: avoid VLA use
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH v2] crypto: ctr - avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/47] arch-removal: device drivers
From
: Boris Brezillon <boris.brezillon@xxxxxxxxxxx>
[PATCH] crypto: doc - Document remaining members in struct crypto_alg
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 19/47] crypto: remove blackfin CRC driver
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 00/47] arch-removal: device drivers
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH] crypto: ctr: avoid VLA use
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH] crypto: ctr: avoid VLA use
From
: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
From
: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
[PATCH] crypto: arm,arm64 - Fix random regeneration of S_shipped
From
: Leonard Crestez <leonard.crestez@xxxxxxx>
[PATCH v2 1/2] dt-bindings: rng: add bindings doc for Keystone SA HWRNG driver
From
: Vitaly Andrianov <vitalya@xxxxxx>
[PATCH v2 0/2] Keystone2 HW random generator
From
: Vitaly Andrianov <vitalya@xxxxxx>
[PATCH v2 2/2] hw_random: keystone2: add hw_random driver
From
: Vitaly Andrianov <vitalya@xxxxxx>
[PATCH 2/3] crypto: inside-secure - improve clock initialization
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
[PATCH 3/3] crypto: inside-secure - fix clock resource by adding a register clock
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
[PATCH 1/3] crypto: inside-secure - fix clock management
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
[PATCH 0/3] crypto: inside-secure: improve clock management
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: J Freyensee <why2jjj.linux@xxxxxxxxx>
Re: [PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
Re: [EXTERNAL] Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
From
: Vitaly Andrianov <vitalya@xxxxxx>
[PATCH -next] crypto: fix missing unlock on error in safexcel_ahash_send_req()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [tpmdd-devel] in-kernel user of ecdsa
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [tpmdd-devel] in-kernel user of ecdsa
From
: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] in-kernel user of ecdsa
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [tpmdd-devel] in-kernel user of ecdsa
From
: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
in-kernel user of ecdsa
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: J Freyensee <why2jjj.linux@xxxxxxxxx>
Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
what is a replacement for private_AES_set_encrypt_key and AES_encrypt functions
From
: Vitaly Andrianov <vitalya@xxxxxx>
Re: [PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
From
: Christophe LEROY <christophe.leroy@xxxxxx>
Re: [PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
From
: Christophe LEROY <christophe.leroy@xxxxxx>
[PATCH 2/2] crypto: talitos: Delete an error message for a failed memory allocation in talitos_edesc_alloc()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/2] crypto: talitos: Use common error handling code in talitos_edesc_alloc()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/2] crypto/talitos: Adjustments for talitos_edesc_alloc()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v10 crypto 07/11] chtls: Program the TLS Key
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v10 crypto 08/11] chtls: CPL handler definition
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v10 crypto 09/11] chtls: Inline TLS request Tx/Rx
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [RFC 0/5] add integrity and security to TPM2 transactions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 0/6] add integrity and security to TPM2 transactions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
RE: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Vakul Garg <vakul.garg@xxxxxxx>
[RFC PATCH] crypto: pcrypt - forbid recursive instantiation
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v3 6/6] tpm2-sessions: NOT FOR COMMITTING add sessions testing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 5/6] trusted keys: Add session encryption protection to the seal/unseal path
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 4/6] tpm2: add session encryption protection to tpm2_get_random()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/6] tpm2: add hmac checks to tpm2_pcr_extend()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/6] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/6] tpm-buf: create new functions for handling TPM buffers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/6] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 0/5] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v5 23/23] DO NOT MERGE
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v5 22/23] crypto: arm64/sm3-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v5 21/23] crypto: arm64/sha512-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]