Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
From
: Dave Watson <davejwatson@xxxxxx>
RE: [Crypto v4 03/12] support for inline tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: Fix incorrect values in PKCS#1 test vector
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 7/8] crypto: inside-secure - keep the requests push/pop synced
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 3/8] crypto: inside-secure - fix the extra cache computation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 8/8] crypto: inside-secure - unmap the result in the hash send error path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 5/8] crypto: inside-secure - do not process request if no command was issued
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 6/8] crypto: inside-secure - fix the invalidation step during cra_exit
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 0/8] crypto: inside-secure - stabilization and fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 4/8] crypto: inside-secure - fix the cache_len computation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 2/8] crypto: inside-secure - do not overwrite the threshold value
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH 1/8] MAINTAINERS: update the Inside Secure maintainer email
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxx>
[PATCH] crypto: Fix incorrect values in PKCS#1 test vector
From
: "Mcloughlin, Conor" <conor.mcloughlin@xxxxxxxxx>
Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH v2 5/5] crypto: speck - add test vectors for Speck64-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 4/5] crypto: speck - add test vectors for Speck128-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 3/5] crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 2/5] crypto: speck - export common helpers
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 1/5] crypto: add support for the Speck block cipher
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH] hwrng: bcm2835: Handle deferred clock properly
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] hwrng: bcm2835: Handle deferred clock properly
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Jeffrey Walton <noloader@xxxxxxxxx>
[PATCH 06/14] x86/crypto: aesni: Introduce gcm_context_data
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 10/14] x86/crypto: aesni: Move HashKey computation from stack to gcm_context
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 13/14] x86/crypto: aesni: Introduce scatter/gather asm function stubs
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 14/14] x86/crypto: aesni: Update aesni-intel_glue to use scatter/gather
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 05/14] x86/crypto: aesni: Merge encode and decode to GCM_ENC_DEC macro
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 12/14] x86/crypto: aesni: Add fast path for > 16 byte update
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 11/14] x86/crypto: aesni: Introduce partial block macro
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 09/14] x86/crypto: aesni: Move ghash_mul to GCM_COMPLETE
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 08/14] x86/crypto: aesni: Fill in new context data structures
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 07/14] x86/crypto: aesni: Split AAD hash calculation to separate macro
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 00/14] x86/crypto gcmaes SSE scatter/gather support
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 03/14] x86/crypto: aesni: Add GCM_INIT macro
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 04/14] x86/crypto: aesni: Add GCM_COMPLETE macro
From
: Dave Watson <davejwatson@xxxxxx>
[PATCH 02/14] x86/crypto: aesni: Macro-ify func save/restore
From
: Dave Watson <davejwatson@xxxxxx>
Re: [Crypto v4 03/12] support for inline tls
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH 01/14] x86/crypto: aesni: Merge INITIAL_BLOCKS_ENC/DEC
From
: Dave Watson <davejwatson@xxxxxx>
Re: [Crypto v4 01/12] tls: tls_device struct to register TLS drivers
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: arm/aes-cipher - move S-box to .rodata section
From
: Jinbum Park <jinb.park7@xxxxxxxxx>
[Crypto v4 12/12] Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 11/12] chtls: Register the chtls Inline TLS with net tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 09/12] chtls: CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 10/12] chtls: Inline crypto request Tx/Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 06/12] cxgb4: LLD driver changes to enable TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 08/12] chtls: Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 07/12] chcr: Key Macro
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 05/12] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 04/12] chtls: structure and macro definiton
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 03/12] support for inline tls
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 01/12] tls: tls_device struct to register TLS drivers
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 02/12] ethtool: feature for Inline TLS in HW
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[Crypto v4 00/12] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: hashing bit oriented messages
From
: Stephan Mueller <smueller@xxxxxxxxxx>
hashing bit oriented messages
From
: Jitendra Lulla <lulla.jitendra@xxxxxxxxx>
Crypto Fixes for 4.16
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: sunxi-ss: Add MODULE_ALIAS to sun4i-ss
From
: Peter Robinson <pbrobinson@xxxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Jeffrey Walton <noloader@xxxxxxxxx>
[PATCH v3 2/4] crypto: AF_ALG - inline IV support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v3 1/4] crypto: AF_ALG AIO - lock context IV
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v3 3/4] crypto: AF_ALG - allow driver to serialize IV access
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v3 0/4] crypto: AF_ALG AIO improvements
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v3 2/3] MIPS: crypto: Add crc32 and crc32c hw accelerated module
From
: James Hogan <jhogan@xxxxxxxxxx>
[PATCH v3 0/3] MIPS CRC instruction support
From
: James Hogan <jhogan@xxxxxxxxxx>
[PATCH v3 4/4] crypto: add CRYPTO_TFM_REQ_IV_SERIALIZE flag
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 0/2] sun4i_ss_prng fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto/generic - sha3: deal with oversize stack frames
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: talitos: fix Kernel Oops on hashing an empty file
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sha512-mb - initialize pending lengths correctly
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 8/9] X.509: remove dead code that set ->unsupported_sig
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 6/9] PKCS#7: remove unnecessary check for NULL sinfo->sig->hash_algo
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 0/9] PKCS#7 / X.509 fixes and cleanups
From
: David Howells <dhowells@xxxxxxxxxx>
RE: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Vakul Garg <vakul.garg@xxxxxxx>
RE: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH 0/5] crypto: Speck support
From
: Jeffrey Walton <noloader@xxxxxxxxx>
[PATCH 2/5] crypto: speck - export common helpers
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 4/5] crypto: speck - add test vectors for Speck128-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 5/5] crypto: speck - add test vectors for Speck64-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 3/5] crypto: arm/speck: add NEON-accelerated implementation of Speck-XTS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 1/5] crypto: add support for the Speck block cipher
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 0/5] crypto: Speck support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH v3] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH v2 0/4] crypto: AF_ALG AIO improvements
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 2/4] crypto: AF_ALG - inline IV support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: AF_ALG - inline IV support
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 0/2] crypto: stm32/cryp - add AEAD cipher algorithms
From
: Fabien Dessenne <fabien.dessenne@xxxxxx>
[PATCH 1/2] crypto: stm32/cryp - add aes gcm / ccm support
From
: Fabien Dessenne <fabien.dessenne@xxxxxx>
[PATCH 2/2] crypto: stm32/cryp - add stm32mp1 support
From
: Fabien Dessenne <fabien.dessenne@xxxxxx>
Re: [PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
From
: Artem Savkov <asavkov@xxxxxxxxxx>
[PATCH v2] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH v2 0/4] crypto: AF_ALG AIO improvements
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH v2 3/4] crypto: AF_ALG - allow driver to serialize IV access
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2 1/4] crypto: AF_ALG AIO - lock context IV
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2 2/4] crypto: AF_ALG - inline IV support
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2 4/4] crypto: add CRYPTO_TFM_REQ_PARALLEL flag
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2 0/4] crypto: AF_ALG AIO improvements
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Anand Moon <linux.amoon@xxxxxxxxx>
[PATCH 9/9] X.509: self_signed implies !unsupported_sig
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 8/9] X.509: remove dead code that set ->unsupported_sig
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 7/9] X.509: remove never-set ->unsupported_key flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 6/9] PKCS#7: remove unnecessary check for NULL sinfo->sig->hash_algo
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 5/9] X.509: fix NULL dereference when restricting key with unsupported_sig
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 4/9] X.509: fix BUG_ON() when hash algorithm is unsupported
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 3/9] PKCS#7: fix direct verification of SignerInfo signature
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 2/9] PKCS#7: fix certificate blacklisting
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 1/9] PKCS#7: fix certificate chain verification
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 0/9] PKCS#7 / X.509 fixes and cleanups
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: qat - Make several functions static
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH] crypto: ccp - Make function ccp_get_dma_chan_attr static
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH] crypto: chelsio - Make function aead_ccm_validate_input static
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH 1/2] sun4i_ss_prng: fix return value of sun4i_ss_prng_generate
From
: Artem Savkov <artem.savkov@xxxxxxxxx>
[PATCH 2/2] sun4i_ss_prng: convert lock to _bh in sun4i_ss_prng_generate
From
: Artem Savkov <artem.savkov@xxxxxxxxx>
[PATCH 0/2] sun4i_ss_prng fixes
From
: Artem Savkov <artem.savkov@xxxxxxxxx>
Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Anand Moon <linux.amoon@xxxxxxxxx>
Re: [PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH] crypto: s5p-sss.c: Fix kernel Oops in AES-ECB mode
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH] crypto: caam - fix endless loop when DECO acquire fails
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RFC PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH AUTOSEL for 4.14 053/110] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
[PATCH AUTOSEL for 4.9 22/52] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
[PATCH AUTOSEL for 4.4 11/32] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Sasha Levin <Alexander.Levin@xxxxxxxxxxxxx>
Re: [RFC PATCH 2/3] crypto: hisilicon hacv1 driver
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 1/2] libcrc32c: Add crc32c_impl function
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Anand Moon <linux.amoon@xxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_register_alg
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: WARNING: kernel stack regs has bad 'bp' value (3)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] libcrc32c: Add crc32c_impl function
From
: David Sterba <dsterba@xxxxxxx>
Re: WARNING: kernel stack regs has bad 'bp' value (3)
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Shawn Guo <shawnguo@xxxxxxxxxx>
Re: [PATCH 1/3] compiler-gcc.h: Introduce __optimize function attribute
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 3/3] crypto: sha3-generic - Use __optimize to support old compilers
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v3 4/5] clk: imx7d: add CAAM clock
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v3 5/5] ARM: dts: imx7s: add CAAM device node
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH 1/3] compiler-gcc.h: Introduce __optimize function attribute
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH 2/3] compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH 3/3] crypto: sha3-generic - Use __optimize to support old compilers
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
RE: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
[PATCH v3 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Junaid Shahid <junaids@xxxxxxxxxx>
RE: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Dave Watson <davejwatson@xxxxxx>
RE: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
Re: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCHv2] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
RE: [PATCH] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
[PATCH] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
[PATCH] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
Re: [PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tls: Add support for encryption using async offload accelerator
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] tls: Add support for encryption using async offload accelerator
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Anand Moon <linux.amoon@xxxxxxxxx>
[PATCH] tls: Add support for encryption using async offload accelerator
From
: Vakul Garg <vakul.garg@xxxxxxx>
[PATCH v3 1/5] crypto: caam: Fix null dereference at error path
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v3 0/5] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v3 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v3 4/5] clk: imx7d: add CAAM clock
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v3 5/5] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v3 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in crypto_destroy_tfm
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel paging request in aead_accept_parent_nokey
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in af_alg_alloc_tsgl
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Dave Watson <davejwatson@xxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH 3/3] arm64: dts: hisi: add SEC crypto accelerator nodes for hip07 SoC
From
: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
[RFC PATCH 2/3] crypto: hisilicon hacv1 driver
From
: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
[RFC PATCH 1/3] dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
From
: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
[RFC PATCH 0/3] Hisilicon SEC accelerator driver
From
: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Subject: [PATCH] crypto: add zbewalgo compression algorithm for zram
From
: Benjamin Warnke <4bwarnke@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG AIO - lock context IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH] crypto: AF_ALG AIO - lock context IV
From
: Stephan Müller <smueller@xxxxxxxxxx>
RE: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
From
: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 1/5] hwrng: stm32 - add reset during probe
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 4/5] dt-bindings: rng: add clock detection error for stm32
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 0/5] hwrng: stm32 - Improvement for stm32-rng
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 2/5] dt-bindings: rng: add reset node for stm32
From
: Lionel Debieve <lionel.debieve@xxxxxx>
[PATCH 3/5] hwrng: stm32 - allow disable clock error detection
From
: Lionel Debieve <lionel.debieve@xxxxxx>
Crypto Update for 4.16
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH 2/3] crypto: stm32/hash: fix performance issues
From
: Lionel Debieve <lionel.Debieve@xxxxxx>
[PATCH 0/3] crypto: stm32/hash: Correction to improve robustness
From
: Lionel Debieve <lionel.Debieve@xxxxxx>
[PATCH 3/3] crypto: stm32/hash: rework padding length
From
: Lionel Debieve <lionel.Debieve@xxxxxx>
[PATCH 1/3] crypto: stm32/hash: avoid error if maxburst not defined
From
: Lionel Debieve <lionel.Debieve@xxxxxx>
Re: [PATCH][next] hwrng: exynos: check for -ve error return from readl_poll_timeout
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH 3/3] crypto: caam/qi - add GCM support
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 2/3] crypto: caam - prepare for gcm(aes) support over QI interface
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 1/3] crypto: caam/qi - return -EBADMSG for ICV check failure
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: Rui Miguel Silva <rui.silva@xxxxxxxxxx>
RE: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH] crypto/generic - sha3: deal with oversize stack frames
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [RESEND PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
From
: Fabio Estevam <festevam@xxxxxxxxx>
[PATCH v2 1/6] Documentation: crypto: document crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 3/6] crypto: omap: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 5/6] crypto: stm32-hash: convert to the new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 4/6] crypto: virtio: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 6/6] crypto: stm32-cryp: convert to the new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 2/6] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[RESEND PATCH v2 4/5] clk: imx7d: add CAAM clock
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v2 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v2 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v2 5/5] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v2 1/5] crypto: caam: Fix null dereference at error path
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Will Deacon <will.deacon@xxxxxxx>
[PATCH v2 1/5] crypto: caam: Fix null dereference at error path
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v2 5/5] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v2 3/5] crypto: caam: do not use mem and emi_slow clock for imx7x
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v2 4/5] clk: imx7d: add CAAM clock
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v2 2/5] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH v2 0/5] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AES-NI GCM - handle zero length dst buffer
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: inside-secure - make function safexcel_try_push_requests static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: artpec6 - remove select on non-existing CRYPTO_SHA384
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: axis - remove unnecessary platform_get_resource() error check
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr.c: test misuse of result in ahash
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: talitos: fix Kernel Oops on hashing an empty file
From
: Christophe Leroy <christophe.leroy@xxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[cryptodev:master 165/172] crypto/sha3_generic.c:147:1: warning: the frame size of 1232 bytes is larger than 1024 bytes
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
Re: [RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: sha1-mb - remove HASH_FIRST flag
From
: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mcryptd - remove pointless wrapper functions
From
: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
Re: [RFC crypto v3 8/9] chtls: Register the ULP
From
: Dave Watson <davejwatson@xxxxxx>
Re: [RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [RESEND PATCH 1/6] crypto: caam: Fix null dereference at error path
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
From
: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Robin Murphy <robin.murphy@xxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: crypto_user: Replace GFP_ATOMIC with GFP_KERNEL in crypto_report
From
: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
[PATCH] crypto: rsa-pkcs1pad: Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
From
: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
[PATCH] crypto: sha512-mb - remove HASH_FIRST flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: sha256-mb - remove HASH_FIRST flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: sha1-mb - remove HASH_FIRST flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: mcryptd - remove pointless wrapper functions
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH] sparc64: fix typo in CONFIG_CRYPTO_DES_SPARC64 => CONFIG_CRYPTO_CAMELLIA_SPARC64
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: "Auer, Lukas" <lukas.auer@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/3] arm64: enable 128-bit memory read/write support
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Jeffrey Walton <noloader@xxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Anand Moon <linux.amoon@xxxxxxxxx>
[RESEND PATCH 1/6] crypto: caam: Fix null dereference at error path
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 3/6] ARM: dts: imx7s: add CAAM device node
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 4/6] imx7d: add CAAM clocks
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 5/6] crypto: caam: add logic to detect when running under TrustZone
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 6/6] crypto: caam: detect RNG init when TrustZone is active
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 2/6] crypto: caam: Fix endless loop when RNG is already initialized
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[RESEND PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
[PATCH 0/6] Enable CAAM on i.MX7s fix TrustZone issues
From
: "Bryan O'Donoghue" <pure.logic@xxxxxxxxxxxxxxxxx>
Re: Odroid HC1 cryptsetup:encrypt sata driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
From
: Jamie Iles <jamie@xxxxxxxxxxxxx>
Odroid HC1 cryptsetup:encrypt sata driver
From
: Anand Moon <linux.amoon@xxxxxxxxx>
Re: [PATCH 3/3] arm64: enable 128-bit memory read/write support
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH RFC 0/3] API for 128-bit IO access
From
: Will Deacon <will.deacon@xxxxxxx>
[PATCH RFC 0/3] API for 128-bit IO access
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH 2/3] asm-generic/io.h: API for 128-bit memory accessors
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH 3/3] arm64: enable 128-bit memory read/write support
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH 1/3] UAPI: Introduce 128-bit types and byteswap operations
From
: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: sha512-mb - initialize pending lengths correctly
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH] sparc64: fix typo in CONFIG_CRYPTO_DES_SPARC64 => CONFIG_CRYPTO_CAMELLIA_SPARC64
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - inline IV support
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
From
: Martin Kaiser <martin@xxxxxxxxx>
Re: [RFC crypto v3 0/9] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: chelsio - Delete stray tabs in create_authenc_wr()
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH -next] hwrng: make symbol imx_rngc_pm_ops static
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 4/4] crypto: aesni - Use zero-copy for gcm(aes) even if the AAD/Data/AuthTag are separate
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH 3/4] crypto: aesni - Directly use kmap_atomic instead of scatter_walk object in gcm(aes)
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH 2/4] crypto: aesni - Enable one-sided zero copy for gcm(aes) request buffers
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH 1/4] crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH 0/4] crypto: aesni - Use zero-copy for gcm(aes) buffers that are partially contiguous
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: AF_ALG - inline IV support
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - inline IV support
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - inline IV support
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH] crypto: chelsio - Delete stray tabs in create_authenc_wr()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH v2 0/7] crypto: ccree: Introduce Arm TrustZone CryptoCell
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 1/7] staging: ccree: rename staging ver and mark as broken
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 3/7] crypto: ccree: add skcipher support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 2/7] crypto: ccree: introduce CryptoCell driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 5/7] crypto: ccree: add AEAD support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 4/7] crypto: ccree: add ahash support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 7/7] MAINTAINERS: update ccree entry
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 6/7] crypto: ccree: add FIPS support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH][next] staging: ccree: fix memory leaks in cc_ivgen_init
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [RFC crypto v3 0/9] Chelsio Inline TLS
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: Getting the ccree driver out of staging
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [RFT PATCH] crypto: arm64 - implement SM3 secure hash using special instructions
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - inline IV support
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH v2] [v2] crypto: aes-generic - fix aes-generic regression on powerpc
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[cryptodev:master 130/155] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
[PATCH] crypto: picoxcell - Fix error handling in spacc_probe()
From
: Alexey Khoroshilov <khoroshilov@xxxxxxxxx>
Re: [PATCH 1/1] crypto: chelsio - Fix indentation warning
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: chelsio - fix code indentation warning
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 8/8] crypto/arm64: sha512 - fix/improve new v8.2 Crypto Extensions code
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 7/8] crypto/arm64: sm3 - new v8.2 Crypto Extensions implementation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 6/8] crypto/arm64: sha3 - new v8.2 Crypto Extensions implementation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 5/8] crypto/testmgr: sha3 - add new testcases
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 4/8] crypto/generic: sha3 - export init/update/final routines
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 3/8] crypto/generic: sha3 - simplify code
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 2/8] crypto/generic: sha3: rewrite KECCAK transform to help the compiler optimize
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 1/8] crypto/generic: sha3 - fixes for alignment and big endian operation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 0/8] crypto: arm64+generic - SHA3/SHA-512/SM-3 roundup
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
From
: Marek Vasut <marex@xxxxxxx>
Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH 1/1] crypto: chelsio - Fix indentation warning
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Megha Dey <megha.dey@xxxxxxxxx>
Re: [PATCH 5/5] crypto: ahash.c: Require export/import in ahash
From
: Marek Vasut <marex@xxxxxxx>
[PATCH v2] crypto: AES-NI GCM - handle zero length dst buffer
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] crypto: AES-NI GCM - handle zero length dst buffer
From
: Stephan Müller <smueller@xxxxxxxxxx>
[cryptodev:master 147/154] drivers/crypto/chelsio/chcr_algo.c:2113:2: note: in expansion of macro 'if'
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
[PATCH 3/5] crypto: ux500/hash: Add empty export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH 4/5] crypto: bfin_crc: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH 5/5] crypto: ahash.c: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH 2/5] crypto: n2_core: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/5] crypto: mxs-dcp: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: n2_core: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ux500/hash: Add empty export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] sha3 fixes and new implementation for arm64
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2] [v2] crypto: aes-generic - fix aes-generic regression on powerpc
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: ux500/hash: Add empty export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[cryptodev:master 147/154] drivers/crypto/chelsio/chcr_algo.c:2113:2: warning: this 'if' clause does not guard...
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
Re: [PATCH] hwrng: imx-rngc: simplify the power management definitions
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: marvell/cesa - Fix DMA API misuse
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] hw_random: mediatek: Setup default RNG quality
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] hwrng: exynos - Signedness bug in exynos_trng_do_read()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH -next] hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] crypto: chelsio - Cleanup and bug fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/7] arm64: move literal data into .rodata section
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFT PATCH] crypto: arm64 - implement SHA-512 using special instructions
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: exynos-rng - Add SPDX license identifier and correct module license
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/7] arm64: move literal data into .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 0/7] arm64: move literal data into .rodata section
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto/ahash: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[bug report] crypto: lrw - Convert to skcipher
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Paolo Valente <paolo.valente@xxxxxxxxxx>
Re: [PATCH] crypto: ux500/hash: Add empty export and import
From
: Linus Walleij <linus.walleij@xxxxxxxxxx>
Re: [PATCH 1/7] staging: ccree: remove ccree from staging tree
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[BUG] skcipher: Test 1 failed (invalid result) on encryption for cts(virtio_crypto_aes_cbc)
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH -next] staging: ccree: remove redundant dev_err call in init_cc_resources()
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 1/7] staging: ccree: remove ccree from staging tree
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
From
: Eric Anholt <eric@xxxxxxxxxx>
[PATCH] crypto: artpec6 - remove select on non-existing CRYPTO_SHA384
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH -next] crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe()
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
[PATCH -next] crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
[PATCH -next] hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
[PATCH -next] crypto: axis - remove unnecessary platform_get_resource() error check
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: David Howells <dhowells@xxxxxxxxxx>
Re: general protection fault in __crypto_alg_lookup
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in crypto_alg_tested
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in crypto_remove_spawns
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: slab-out-of-bounds Write in sha3_update (2)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Paolo Valente <paolo.valente@xxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Paolo Valente <paolo.valente@xxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [RFT PATCH] crypto: arm64 - implement SM3 secure hash using special instructions
From
: Steve Capper <steve.capper@xxxxxxx>
AES-NI: BUG in gcmaes_decrypt
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2] crypto/ahash: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] net/core: Increase default optmem_max limit
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: [PATCH v2] net/core: Increase default optmem_max limit
From
: "Björn 'besser82' Esser" <besser82@xxxxxxxxxxxxxxxxx>
[PATCH v2] net/core: Increase default optmem_max limit
From
: "Björn 'besser82' Esser" <besser82@xxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Marek Vasut <marex@xxxxxxx>
[PATCH] crypto: ux500/hash: Add empty export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: n2_core: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: mxs-dcp: Add empty hash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: testmgr.c: test misuse of result in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [RFT PATCH] crypto: ahash.c: Require export/import in ahash
From
: Bartlomiej Zolnierkiewicz <b.zolnierkie@xxxxxxxxxxx>
[bug report] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[RFT PATCH] crypto: ahash.c: Require export/import in ahash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] sha3 fixes and new implementation for arm64
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 0/5] sha3 fixes and new implementation for arm64
From
: Steve Capper <steve.capper@xxxxxxx>
[RFT PATCH] crypto: arm64 - implement SM3 secure hash using special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFT PATCH] crypto: arm64 - implement SHA-512 using special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFT PATCH] crypto: arm64 - implement SHA-512 using special instructions
From
: Steve Capper <steve.capper@xxxxxxx>
[PATCH v2] crypto: inside-secure - make function safexcel_try_push_requests static
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 00/17] crypto: inside-secure - various improvements
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: wp512: fixed a brace coding style issue
From
: Robert Donald Rickett <robert.rickett@xxxxxxxxx>
[PATCH v2] [v2] crypto: aes-generic - fix aes-generic regression on powerpc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: aes-generic - fix aes-generic regression on powerpc
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH] crypto: aes-generic - fix aes-generic regression on powerpc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH 1/4] crypto: ccp: Fix sparse, use plain integer as NULL pointer
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH 0/4] KVM: SVM: kbuild test robot warning fixes
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH 4.4 43/87] hwrng: core - sleep interruptible in read
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH] crypto/generic: sha3: rewrite KECCAK transform to help the GCC optimizer
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: AF_ALG: skb limits
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH] crypto: AF_ALG - inline IV support
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH][next] hwrng: exynos: check for -ve error return from readl_poll_timeout
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 1/3] crypto/generic: sha3 - fixes for alignment and big endian operation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 1/3] crypto/generic: sha3 - fixes for alignment and big endian operation
From
: Chris Moore <moore@xxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Arnd Bergmann <arnd@xxxxxxxx>
[cryptodev:master 130/135] undefined reference to `_restgpr_31_x'
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
[PATCH v2 3/3] crypto/testmgr: sha3 - add new testcases
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v2 2/3] crypto/arm64: sha3 - new scalar + v8.2 Crypto Extensions implementation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v2 1/3] crypto/generic: sha3 - fixes for alignment and big endian operation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v2 0/3] sha3 fixes and new implementation for arm64
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: AF_ALG: skb limits
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 1/7] staging: ccree: remove ccree from staging tree
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v2] crypto: testmgr: change `guard` to unsigned char
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
[PATCH][next] hwrng: exynos: check for -ve error return from readl_poll_timeout
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH][next] staging: ccree: fix memory leaks in cc_ivgen_init
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH 0/5] sha3 fixes and new implementation for arm64
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: Arnd Bergmann <arnd@xxxxxxxx>
[cryptodev:master 130/134] aes_generic.c:undefined reference to `_restgpr_31_x'
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
[RFC] AF_ALG AIO and IV
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 5/5] crypto/testmgr: sha3 - add new testcases
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 4/5] crypto/arm64: sha3 - new implementation based on special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 3/5] crypto/generic: sha3 - export init/update/final routines
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 2/5] crypto/generic: sha3 - simplify code
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 1/5] crypto/generic: sha3 - fixes for alignment and big endian operation
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 0/5] sha3 fixes and new implementation for arm64
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 00/17] crypto: inside-secure - various improvements
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chacha20 - use rol32() macro from bitops.h
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: clear htmldocs build warnings for crypto/hash
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] [v2] crypto: aes-generic - build with -Os on gcc-7+
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] crypto: AF_ALG - whitelist mask and type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] crypto: salsa20 - cleanup and convert to skcipher API
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: tcrypt - free xoutbuf instead of axbuf
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH][crypto-next] crypto: tcrypt: fix spelling mistake: "bufufer"-> "buffer"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 0/9] crypto: prevent unkeyed use of keyed algorithms
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: testmgr: change `guard` to unsigned char
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH 2/6] crypto: engine - Permit to enqueue all async requests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: Implement a generic crypto statistics
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Crypto Fixes for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Paolo Valente <paolo.valente@xxxxxxxxxx>
Re: kernel failure while loading X.509 certificate
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH V4 1/2] clk: imx: imx7d: add the snvs clock
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH] hwrng: imx-rngc: simplify the power management definitions
From
: Martin Kaiser <martin@xxxxxxxxx>
[PATCH 1/2] crypto: Implement a generic crypto statistics
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH 2/2] crypto: tools: Add cryptostat userspace
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH 0/2] crypto: Implement generic crypto statistics
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Patch "hwrng: core - sleep interruptible in read" has been added to the 4.4-stable tree
From
: <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Re: [PATCH] hwrng: exynos - Signedness bug in exynos_trng_do_read()
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 1/5] crypto: chelsio - Fix Indentation
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH 0/5] crypto: chelsio - Cleanup and bug fixes
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH 3/5] crypto: chelsio - Fix IV updated in XTS operation
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH 2/5] crypto: chelsio - check for sg null
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH 5/5] crypto: chelsio - Remove dst sg size zero check
From
: Harsh Jain <harsh@xxxxxxxxxxx>
[PATCH 4/5] crypto: chelsio - Add authenc versions of ctr and sha
From
: Harsh Jain <harsh@xxxxxxxxxxx>
Re: [PATCH -next] hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH -next] staging: ccree: remove redundant dev_err call in init_cc_resources()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
[PATCH] staging: ccree: don't break lines unnecessarily
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 3/7] crypto: ccree: add ablkcipher support
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 1/7] staging: ccree: remove ccree from staging tree
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 3/7] crypto: ccree: add ablkcipher support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/7] crypto: ccree: introduce CryptoCell driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 6/7] crypto: ccree: add FIPS support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 5/7] crypto: ccree: add AEAD support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 4/7] crypto: ccree: add ahash support
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 7/7] MAINTAINERS: update ccree entry
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 0/7] Introduce Arm TrustZone CryptoCell
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: Getting the ccree driver out of staging
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 6/6] crypto: stm32-cryp: convert to the new crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH 5/6] crypto: stm32-hash: convert to the new crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH 2/6] crypto: engine - Permit to enqueue all async requests
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: Getting the ccree driver out of staging
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Getting the ccree driver out of staging
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
RE: [RFC crypto v3 0/9] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH 1/6] Documentation: crypto: document crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: Getting the ccree driver out of staging
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: marvell/cesa - Fix DMA API misuse
From
: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
[RFC PATCH] arm64/kernel: don't ban ADRP to work around Cortex-A53 erratum #843419
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: marvell/cesa - Fix DMA API misuse
From
: Christoph Hellwig <hch@xxxxxx>
Re: [PATCH] crypto: marvell/cesa - Fix DMA API misuse
From
: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: marvell/cesa - Fix DMA API misuse
From
: Robin Murphy <robin.murphy@xxxxxxx>
Re: dm-integrity: don't store cipher request on the stack (was: [QUESTION] hash import and request initialization)
From
: Mike Snitzer <snitzer@xxxxxxxxxx>
[PATCH] dm-integrity: don't store cipher request on the stack (was: [QUESTION] hash import and request initialization)
From
: Mikulas Patocka <mpatocka@xxxxxxxxxx>
Re: [PATCH 6/6] crypto: stm32-cryp: convert to the new crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH 5/6] crypto: stm32-hash: convert to the new crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH -next] hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/6] crypto: engine - Permit to enqueue all async requests
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH 1/6] Documentation: crypto: document crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
[PATCH -next] hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
[PATCH 3/7] arm64/crypto: aes-neon: move literal data to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 6/7] arm64/crypto: sha2-ce: move the round constant table to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 7/7] arm64/crypto: sha1-ce: get rid of literal pool
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 5/7] arm64/crypto: crct10dif: move literal data to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 4/7] arm64/crypto: crc32: move literal data to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 2/7] arm64/crypto: aes-cipher: move S-box to .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 1/7] arm64: kernel: avoid executable literal pools
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 0/7] arm64: move literal data into .rodata section
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] hwrng: exynos - Signedness bug in exynos_trng_do_read()
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH] hwrng: exynos - Signedness bug in exynos_trng_do_read()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Getting the ccree driver out of staging
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] hw_random: mediatek: Setup default RNG quality
From
: <sean.wang@xxxxxxxxxxxx>
[PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
[PATCH V8 5/5] crypto: AES CBC multi-buffer glue code
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
[PATCH V8 4/5] crypto: AES CBC by8 encryption
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
[PATCH V8 3/5] crypto: AES CBC multi-buffer scheduler
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
[PATCH V8 2/5] crypto: AES CBC multi-buffer data structures
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
[PATCH V8 0/5] crypto: AES CBC multibuffer implementation
From
: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
Re: [PATCH V7 5/7] crypto: AES CBC multi-buffer glue code
From
: Megha Dey <megha.dey@xxxxxxxxx>
[RFT PATCH] crypto: arm64 - implement SHA-512 using special instructions
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 1/2] crypto: exynos-rng - Add SPDX license identifier and correct module license
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH 2/2] crypto: s5p-sss - Add SPDX license identifier
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH 1/5] staging: ccree: use a consistent file naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/5] staging: ccree: remove unneeded includes
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 3/5] staging: ccree: add missing include
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 4/5] staging: ccree: make stub function static inline
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Dong Aisheng <dongas86@xxxxxxxxx>
[PATCH 5/5] staging: ccree: dma mask is type u64
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 0/5] more cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH V4 1/2] clk: imx: imx7d: add the snvs clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
RE: [PATCH V3 1/2] clk: imx: imx7d: add the snvs clock
From
: Anson Huang <anson.huang@xxxxxxx>
[PATCH V4 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
RE: [PATCH V3 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Anson Huang <anson.huang@xxxxxxx>
Re: Hang loading omap_rng on MacchiatoBin with 4.15-rc7
From
: Riku Voipio <riku.voipio@xxxxxxxxxx>
Re: [PATCH V3 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Dong Aisheng <dongas86@xxxxxxxxx>
Re: Hang loading omap_rng on MacchiatoBin with 4.15-rc7
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V3 1/2] clk: imx: imx7d: add the snvs clock
From
: Dong Aisheng <dongas86@xxxxxxxxx>
[PATCH V3 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
[PATCH V3 1/2] clk: imx: imx7d: add the snvs clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
Re: Hang loading omap_rng on MacchiatoBin with 4.15-rc7
From
: Riku Voipio <riku.voipio@xxxxxxxxxx>
RE: [PATCH V2 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Anson Huang <anson.huang@xxxxxxx>
Re: [PATCH V2 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Fabio Estevam <festevam@xxxxxxxxx>
Re: Hang loading omap_rng on MacchiatoBin with 4.15-rc7
From
: Gregory CLEMENT <gregory.clement@xxxxxxxxxxxxxxxxxx>
Hang loading omap_rng on MacchiatoBin with 4.15-rc7
From
: Riku Voipio <riku.voipio@xxxxxxxxxx>
Re: [PATCH v3 24/27] staging: ccree: use a consistent file naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: clear htmldocs build warnings for crypto/hash
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH V2 1/2] clk: imx: imx7d: add the snvs clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
[PATCH V2 2/2] ARM: dts: imx7s: add snvs rtc clock
From
: Anson Huang <Anson.Huang@xxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH] checkpatch: add *_ON_STACK to $declaration_macros
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [PATCH v3 24/27] staging: ccree: use a consistent file naming convention
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: clear htmldocs build warnings for crypto/hash
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: ssi_hash: remove unnecessary parentheses
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 15/27] staging: ccree: use Makefile to include PM code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 14/27] staging: ccree: handle end of sg list gracefully
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 13/27] staging: ccree: check DMA pool buf !NULL before free
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 12/27] staging: ccree: failing the suspend is not an error
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 11/27] stating: ccree: revert "staging: ccree: fix leak of import() after init()"
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 01/27] staging: ccree: SPDXify driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH v3 10/27] staging: ccree: add backlog processing
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 09/27] staging: ccree: break send_request and fix ret val
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 08/27] staging: ccree: remove unused leftover field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 27/27] staging: ccree: add missing include
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 07/27] staging: ccree: tag debugfs init/exit func properly
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 26/27] staging: ccree: update TODO
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 06/27] staging: ccree: copy larval digest from RAM
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 05/27] staging: ccree: pick alloc mem flags based on req flags
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 24/27] staging: ccree: use a consistent file naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 04/27] staging: ccree: remove GFP_DMA flag from mem allocs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 03/27] staging: ccree: fold reg common defines into driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 25/27] staging: ccree: remove unneeded includes
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 02/27] staging: ccree: fold hash defs into queue defs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 23/27] stating: ccree: fix allocation of void sized buf
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 01/27] staging: ccree: SPDXify driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 22/27] staging: ccree: put pointer next to var name
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 20/27] staging: ccree: fix indentation of func params
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 00/27] staging: ccree: fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 21/27] staging: ccree: fold common code into service func
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: shorten lengthy lines with breaks
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 19/27] staging: ccree: do not map bufs in ahash_init
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 18/27] staging: ccree: allocate hash bufs inside req ctx
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 17/27] staging: ccree: use array for double buffer
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v3 16/27] staging: ccree: remove unused field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 01/27] staging: ccree: SPDXify driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: clear htmldocs build warnings for crypto/hash
From
: "Tobin C. Harding" <me@xxxxxxxx>
Re: [PATCH] staging: ccree: shorten lengthy lines with breaks
From
: Joe Perches <joe@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]