Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v2 3/3] crypto: x86/salsa20 - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 2/3] crypto: salsa20 - export generic helpers
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 1/3] crypto: salsa20-generic - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 0/3] crypto: salsa20 - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] crypto: algapi - fix NULL dereference in crypto_remove_spawns()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: poly1305 - get rid of cra_alignmask
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: algapi - remove unused notifications
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: algapi - convert cra_refcnt to refcount_t
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] crypto: inside-secure - 2 extra fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [v1] crypto: crypto4xx - perform aead icv check in the driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [v1,1/4] crypto: crypto4xx - shuffle iomap in front of request_irq
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: padata: add SPDX identifier
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v10 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Horia Geantă <horia.geanta@xxxxxxx>
Crypto Fixes for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 6/8] net: caif: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [ovs-dev] [PATCH 7/8] net: ovs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH v10 8/8] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 0/8] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 4/8] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 5/8] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 3/8] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 2/8] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v10 6/8] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH] [v2] crypto: aes-generic - build with -Os on gcc-7+
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH] [v2] crypto: aes-generic - build with -Os on gcc-7+
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 1/6] Documentation: crypto: document crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 0/6] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 2/6] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 4/6] crypto: virtio: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 3/6] crypto: omap: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 5/6] crypto: stm32-hash: convert to the new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH 6/6] crypto: stm32-cryp: convert to the new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: general protection fault in blkcipher_walk_done (2)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 9/9] crypto: aead - prevent using AEADs without setting key
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 8/9] crypto: skcipher - prevent using skciphers without setting key
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 7/9] crypto: ghash - remove checks for key being set
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 6/9] crypto: hash - prevent using keyed hashes without setting key
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 5/9] crypto: hash - annotate algorithms taking optional key
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 4/9] crypto: poly1305 - remove ->setkey() method
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 3/9] crypto: mcryptd - pass through absence of ->setkey()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 2/9] crypto: cryptd - pass through absence of ->setkey()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 1/9] crypto: hash - introduce crypto_hash_alg_has_setkey()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[RFC PATCH 0/9] crypto: prevent unkeyed use of keyed algorithms
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v9 6/8] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 0/8] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 4/8] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 2/8] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 5/8] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 3/8] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 8/8] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v2 01/27] staging: ccree: SPDXify driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH v2 01/27] staging: ccree: SPDXify driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 03/27] staging: ccree: fold reg common defines into driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 04/27] staging: ccree: remove GFP_DMA flag from mem allocs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 05/27] staging: ccree: pick alloc mem flags based on req flags
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 06/27] staging: ccree: copy larval digest from RAM
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 15/27] staging: ccree: use Makefile to include PM code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 14/27] staging: ccree: handle end of sg list gracefully
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 12/27] staging: ccree: failing the suspend is not an error
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 10/27] staging: ccree: add backlog processing
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 09/27] staging: ccree: break send_request and fix ret val
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 20/27] staging: ccree: fix indentation of func params
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 27/27] staging: ccree: add missing include
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 26/27] staging: ccree: update TODO
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 25/27] staging: ccree: remove unneeded includes
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 19/27] staging: ccree: do not map bufs in ahash_init
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 18/27] staging: ccree: allocate hash bufs inside req ctx
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 17/27] staging: ccree: use array for double buffer
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 16/27] staging: ccree: remove unused field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 24/27] staging: ccree: use a consistent file naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 21/27] staging: ccree: fold common code into service func
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 23/27] stating: ccree: fix allocation of void sized buf
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 22/27] staging: ccree: put pointer next to var name
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 13/27] staging: ccree: check DMA pool buf !NULL before free
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 11/27] stating: ccree: revert "staging: ccree: fix leak of import() after init()"
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 08/27] staging: ccree: remove unused leftover field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 07/27] staging: ccree: tag debugfs init/exit func properly
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 02/27] staging: ccree: fold hash defs into queue defs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 00/27] staging: ccree: fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: mark debug_regs[] as static
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] staging: ccree: mark debug_regs[] as static
From
: Arnd Bergmann <arnd@xxxxxxxx>
general protection fault in blkcipher_walk_done (2)
From
: syzbot <syzbot+9da652f470afd0313350@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH][crypto-next] crypto: inside-secure - make function safexcel_try_push_requests static
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [RFC crypto v3 0/9] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH] crypto: tcrypt - free xoutbuf instead of axbuf
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH][crypto-next] crypto: inside-secure - make function safexcel_try_push_requests static
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH][crypto-next] crypto: tcrypt: fix spelling mistake: "bufufer"-> "buffer"
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH v4] crypto: AF_ALG - whitelist mask and type
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v3] crypto: AF_ALG - whitelist mask and type
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2] crypto: testmgr: change `guard` to unsigned char
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
Re: [PATCH] crypto: testmgr: change `guard` to unsigned char
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
Re: [PATCH] crypto: testmgr: change `guard` to unsigned char
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 01/26] staging: ccree: SPDXify driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: salsa20-generic - cleanup and convert to skcipher API
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 01/26] staging: ccree: SPDXify driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH 02/26] staging: ccree: fold hash defs into queue defs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 04/26] staging: ccree: remove GFP_DMA flag from mem allocs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 05/26] staging: ccree: pick alloc mem flags based on req flags
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 06/26] staging: ccree: copy larval digest from RAM
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 09/26] staging: ccree: breakup send_request
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 11/26] stating: ccree: revert "staging: ccree: fix leak of import() after init()"
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 13/26] staging: ccree: check DMA pool buf !NULL before free
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 14/26] staging: ccree: handle end of sg list gracefully
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 16/26] staging: ccree: remove unused field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 17/26] staging: ccree: use array for double buffer
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 25/26] staging: ccree: remove unneeded includes
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 26/26] staging: ccree: update TODO
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 24/26] staging: ccree: use a consistent file naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 19/26] staging: ccree: do not map bufs in ahash_init
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 20/26] staging: ccree: fix indentation of func params
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 21/26] staging: ccree: fold common code into service func
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 22/26] staging: ccree: put pointer next to var name
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 23/26] stating: ccree: fix allocation of void sized buf
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 18/26] staging: ccree: allocate hash bufs inside req ctx
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 15/26] staging: ccree: use Makefile to include PM code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 12/26] staging: ccree: failing the suspend is not an error
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 10/26] staging: ccree: add backlog processing
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 08/26] staging: ccree: remove unused leftover field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 07/26] staging: ccree: tag debugfs init/exit func properly
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 03/26] staging: ccree: fold reg common defines into driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 01/26] staging: ccree: SPDXify driver
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 00/26] staging: ccree: fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: testmgr: change `guard` to unsigned char
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
[PATCH] crypto: chacha20 - use rol32() macro from bitops.h
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 3/3] crypto: x86/salsa20 - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 2/3] crypto: salsa20 - export generic helpers
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 1/3] crypto: salsa20-generic - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 0/3] crypto: salsa20 - cleanup and convert to skcipher API
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
From
: Himanshu Jha <himanshujha199640@xxxxxxxxx>
Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
From
: Joe Perches <joe@xxxxxxxxxxx>
[PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
From
: Himanshu Jha <himanshujha199640@xxxxxxxxx>
Re: INFO: task hung in aead_recvmsg
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
Re: [PATCH] padata: add SPDX identifier
From
: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
[PATCH] crypto: algapi - fix NULL dereference in crypto_remove_spawns()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 3/3] crypto: x86/poly1305 - remove cra_alignmask
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 2/3] crypto: poly1305 - remove cra_alignmask
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 1/3] crypto: poly1305 - use unaligned access macros to output digest
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 0/3] crypto: poly1305 - get rid of cra_alignmask
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: algapi - remove unused notifications
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: algapi - convert cra_refcnt to refcount_t
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] staging: ccree: ssi_hash: remove unnecessary parentheses
From
: Elad Wexler <elad.wexler@xxxxxxxxx>
Re: WARNING: kernel stack regs has bad 'bp' value (2)
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH v3 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: stm32 - Use standard CONFIG name
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: scomp - delete unused comments
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/4] crypto: caam - constify key data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/6] crypto: tcrypt: fix and add multi buf speed tests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] padata: add SPDX identifier
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: WARNING: kernel stack regs has bad 'bp' value (2)
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Decreasing time for `rsa_init`
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH 0/2] crypto: inside-secure - 2 extra fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 2/2] crypto: inside-secure - fix hash when length is a multiple of a block
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 1/2] crypto: inside-secure - avoid unmapping DMA memory that was not mapped
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: Decreasing time for `rsa_init`
From
: Paul Menzel <pmenzel+linux-crypto@xxxxxxxxxxxxx>
Re: [QUESTION] hash import and request initialization
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[QUESTION] hash import and request initialization
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: INFO: task hung in aead_recvmsg
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: INFO: task hung in lock_sock_nested
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v1] crypto: crypto4xx - perform aead icv check in the driver
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 4/4] crypto: crypto4xx - kill MODULE_NAME
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 3/4] crypto: crypto4xx - fix missing irq devname
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 2/4] crypto: crypto4xx - support Revision B parts
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
[PATCH v1 1/4] crypto: crypto4xx - shuffle iomap in front of request_irq
From
: Christian Lamparter <chunkeey@xxxxxxxxx>
Re: [PATCH v5] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: KASAN: use-after-free Read in __list_del_entry_valid (2)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: wild-memory-access Write in scatterwalk_copychunks
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: slab-out-of-bounds Write in sha3_update (2)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v5] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
KASAN: slab-out-of-bounds Write in sha3_update (2)
From
: syzbot <bot+80f661b525da04e7baaef60ee883f18be36f3942@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 00/17] crypto: inside-secure - various improvements
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH v4 0/4] crypto: inside-secure - set of fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH crypto] crypto: aesni - add wrapper for generic gcm(aes)
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH crypto] crypto: aesni - fix typo in generic_gcmaes_decrypt
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/17] crypto: inside-secure - various improvements
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] Assorted changes for Exynos PRNG driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: seqiv - Remove unused alg/spawn variable
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: echainiv - Remove unused alg/spawn variable
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: artpec6: set correct iv size for gcm(aes)
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: gf128mul - remove incorrect comment
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: qat - reduce stack size with KASAN
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: null - Get rid of crypto_{get,put}_default_null_skcipher2()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: api - Unexport crypto_larval_lookup()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: exynos - Icrease the priority of the driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [crypto] chcr: fix a type cast error
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 02/45] drivers: crypto: remove duplicate includes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: pcrypt - fix freeing pcrypt instances
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: n2 - cure use after free
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chacha20poly1305 - validate the digest size
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chcr: select CRYPTO_GF128MUL
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: stm32 - Use standard CONFIG name
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Ralf Baechle <ralf@xxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - limit mask and type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - limit mask and type
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - limit mask and type
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Crypto Fixes for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH] staging: ccree: fix type mismatch warning
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: fix __dump_byte_array() declaration mismatch
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH] staging: ccree: fix type mismatch warning
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Paolo Bonzini <pbonzini@xxxxxxxxxx>
Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH] padata: add SPDX identifier
From
: Cheah Kok Cheong <thrust73@xxxxxxxxx>
Re: [PATCH 1/2] padata: Remove FSF address
From
: Cheah Kok Cheong <thrust73@xxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: pcrypt - fix freeing pcrypt instances
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH 1/2] padata: Remove FSF address
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v3 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v3 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH RFC 3/3] crypto: tools: Add cryptostat userspace
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: BUG: unable to handle kernel paging request in hmac_init_tfm
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel paging request in socket_file_ops
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: pcrypt - fix freeing pcrypt instances
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Jakub Jelinek <jakub@xxxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH 1/2] padata: Remove FSF address
From
: Cheah Kok Cheong <thrust73@xxxxxxxxx>
Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
From
: Arnd Bergmann <arnd@xxxxxxxx>
BUG: unable to handle kernel paging request in socket_file_ops
From
: syzbot <bot+cd76df3adeb2edd4836f7b3ef94d32d710c28421@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] padata: Remove FSF address
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH 2/2] padata: Remove redundant export.h header
From
: Cheah Kok Cheong <thrust73@xxxxxxxxx>
[PATCH 1/2] padata: Remove FSF address
From
: Cheah Kok Cheong <thrust73@xxxxxxxxx>
[PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH RFC 2/3] crypto: Implement a generic crypto statistics
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH RFC 3/3] crypto: tools: Add cryptostat userspace
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH RFC 0/3] crypto: Implement a generic crypto statistics
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Re: [PATCH] Fix NULL pointer deref. on no default_rng
From
: Pierre <pinaraf@xxxxxxxxxxxx>
Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH] iommu/amd - Set the device table entry PPR bit for IOMMU V2 devices
From
: Gary R Hook <gary.hook@xxxxxxx>
[PATCH] crypto: stm32 - Use standard CONFIG name
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH] staging: ccree: fix __dump_byte_array() declaration mismatch
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH] iommu/amd - Set the device table entry PPR bit for IOMMU V2 devices
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[RFC crypto v3 9/9] Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 7/9] chtls: Inline crypto request Tx/Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 6/9] chtls: CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 5/9] chtls: Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 4/9] chcr: Key Macro
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 3/9] cxgb4: LLD driver changes to enable TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 2/9] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 1/9] chtls: structure and macro definiton
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v3 0/9] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] checkpatch: add *_ON_STACK to $declaration_macros
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH RESEND] checkpatch: add *_ON_STACK to declaration_macros
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_aead_free_instance
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH RESEND] checkpatch: add *_ON_STACK to declaration_macros
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
KASAN: use-after-free Read in crypto_aead_free_instance
From
: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: use size_t consistently
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] staging: ccree: use size_t consistently
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: scomp - delete unused comments
From
: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
[PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
[PATCH v2 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
[PATCH] crypto: Fix out-of-bounds memory access in generic-gcm-aesni
From
: Junaid Shahid <junaids@xxxxxxxxxx>
Re: [PATCH] crypto: n2 - cure use after free
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH] crypto: n2 - cure use after free
From
: Jan Engelhardt <jengelh@xxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH] crypto: n2 - cure use after free
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] crypto: n2 - cure use after free
From
: Jan Engelhardt <jengelh@xxxxxxx>
RE: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [Plinth PATCH]{topost} crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[Plinth PATCH]{topost} crypto: Fix race around ctx->rcvused by making it atomic_t
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH v2 4/4] crypto: caam - add Derived Key Protocol (DKP) support
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2 3/4] crypto: caam - save Era in driver's private data
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2 2/4] crypto: caam - remove needless ablkcipher key copy
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2 1/4] crypto: caam - constify key data
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Juergen Gross <jgross@xxxxxxxx>
Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Ingo Molnar <mingo@xxxxxxxxxx>
[PATCH v2] crypto: AF_ALG - limit mask and type
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Li Kun <hw.likun@xxxxxxxxxx>
[PATCH] crypto: x86/twofish-3way - Fix %rbp usage
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: RFC: Crypto: Race in updating available writable socket memory.
From
: Stephan Mueller <smueller@xxxxxxxxxx>
RFC: Crypto: Race in updating available writable socket memory.
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Li Kun <hw.likun@xxxxxxxxxx>
Re: [PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Li Kun <hw.likun@xxxxxxxxxx>
Re: [PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
From
: Li Kun <hw.likun@xxxxxxxxxx>
Re: KASAN: use-after-free Read in __list_del_entry_valid (2)
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
From
: Stephan Mueller <smueller@xxxxxxxxxx>
KASAN: use-after-free Read in __list_del_entry_valid (2)
From
: syzbot <bot+29cf0a34886ca39d13fc0451b174140973b5bed3@xxxxxxxxxxxxxxxxxxxxxxxxx>
BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
From
: syzbot <bot+08fafbe591c1d2980114c828ef2d7b5a46c19bff@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH v2 3/6] crypto: tcrypt: allow setting num of bufs
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 4/6] crypto: tcrypt: add multi buf ahash jiffies test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 6/6] crypto: tcrypt: add multibuf aead speed test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 5/6] crypto: tcrypt: add multibuf skcipher speed test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 2/6] crypto: tcrypt: fix AEAD decryption speed test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 1/6] crypto: tcrypt: use multi buf for ahash mb test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 0/6] crypto: tcrypt: fix and add multi buf speed tests
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 33/45] arch/arm: remove duplicate includes
From
: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
[PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: general protection fault in ___cache_free
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH 00/17] crypto: inside-secure - various improvements
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 15/17] crypto: inside-secure - retry to proceed the request later on fail
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 16/17] crypto: inside-secure - EIP97 support
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 06/17] crypto: inside-secure - EBUSY is not an error on async request
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 08/17] crypto: inside-secure - remove unused parameter in invalidate_cache
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 02/17] crypto: inside-secure - fix typo in a comment
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 07/17] crypto: inside-secure - move cipher crypto mode to request context
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 09/17] crypto: inside-secure - move request dequeueing into a workqueue
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 05/17] crypto: inside-secure - refrain from unneeded invalidations
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 12/17] crypto: inside-secure - increase the ring size
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 13/17] crypto: inside-secure - acknowledge the result requests all at once
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 10/17] crypto: inside-secure - use threaded IRQs for result handling
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 14/17] crypto: inside-secure - handle more result requests when counter is full
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 11/17] crypto: inside-secure - dequeue all requests at once
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 17/17] Documentation/bindings: crypto: document the SafeXcel EIP97 compatible
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 03/17] crypto: inside-secure - remove useless memset
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 04/17] crypto: inside-secure - comment the caching function
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 01/17] crypto: inside-secure - remove extra empty line
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 06/10] staging: ccree: remove useless debug code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 05/10] staging: ccree: remove CC_IRQ_DELAY dead code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 03/10] staging: ccree: add explicit module init/exit func
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 02/10] staging: ccree: clean up PM registration
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 01/10] staging: ccree: drop ifdef CONFIG_OF in code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 08/10] staging: ccree: remove ssi_config.h
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 09/10] staging: ccree: fix fips event irq handling build
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 10/10] staging: ccree: update TODO
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 07/10] staging: ccree: turn compile time debug log to params
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 00/10] staging: ccree: cleanups & fixes
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Encrypt selftest fails with qat_c3xxx
From
: Georg Sauthoff <mail@xxxxxxxx>
[PATCH crypto] crypto: aesni - add wrapper for generic gcm(aes)
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
[PATCH crypto] crypto: aesni - fix typo in generic_gcmaes_decrypt
From
: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v3 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v3 2/4] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v3 1/4] crypto: exynos - Support Exynos5250+ SoCs
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH] hwrng: Clean up RNG list when last hwrng is unregisterd
From
: Gary R Hook <gary.hook@xxxxxxx>
[PATCH 2/2] crypto: seqiv - Remove unused alg/spawn variable
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH 1/2] crypto: echainiv - Remove unused alg/spawn variable
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Re: [PATCH v4] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: INFO: task hung in lock_sock_nested
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: INFO: task hung in aead_recvmsg
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
[PATCH v3 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v3 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v3 2/4] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v3 1/4] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v3 0/4] Assorted changes for Exynos PRNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 02/24] staging: ccree: fix hash naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 03/24] staging: ccree: amend hash func def for readability
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 06/24] staging: ccree: fix func def and decl coding style
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 07/24] staging: ccree: simplify expression with local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 10/24] staging: ccree: fix req mgr func def coding style
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 12/24] staging: ccree: fix cipher naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 14/24] staging: ccree: fix ivgen naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 15/24] staging: ccree: fix ivgen func def coding style
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 16/24] staging: ccree: drop unsupported MULTI2 mode code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 17/24] staging: ccree: remove SSI_CC_HAS_ macros
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 20/24] staging: ccree: rename vars/structs/enums from ssi_ to cc_
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 22/24] staging: ccree: fix sram mgr naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 23/24] staging: ccree: simplify freeing SRAM memory address
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 24/24] staging: ccree: fix FIPS mgr naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 21/24] staging: ccree: fix buf mgr naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 19/24] staging: ccree: rename all DX to CC
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 18/24] staging: ccree: rename all SSI to CC
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 13/24] staging: ccree: fix cipher func def coding style
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 11/24] staging: ccree: remove cipher sync blkcipher remains
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 09/24] staging: ccree: fix reg mgr naming convention
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 08/24] staging: ccree: fix func call param indentation
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 05/24] staging: ccree: shorten parameter name
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 04/24] staging: ccree: func params should follow func name
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 01/24] staging: ccree: remove ahash wrappers
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 00/24] staging: ccree: cleanups and simplification
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: AF_ALG: skb limits
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH v4] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[RFC crypto v2 9/9] Makefile Kconfig
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 8/9] chtls: Register the ULP
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 7/9] chtls: Inline crypto request Tx/Rx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 6/9] chtls: CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 5/9] chtls: Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 4/9] chcr: Key Macro
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 3/9] cxgb4: LLD driver changes to enable TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 2/9] cxgb4: Inline TLS FW Interface
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 1/9] chtls: structure and macro definiton
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[RFC crypto v2 0/9] Chelsio Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v2] crypto: artpec6: set correct iv size for gcm(aes)
From
: Lars Persson <lars.persson@xxxxxxxx>
Re: [PATCH] crypto: artpec6: set correct iv size for gcm(aes)
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH] crypto: artpec6: set correct iv size for gcm(aes)
From
: Lars Persson <lars.persson@xxxxxxxx>
Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - limit mask and type
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - limit mask and type
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: AF_ALG - limit mask and type
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH] crypto: gf128mul - remove incorrect comment
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: chacha20poly1305 - validate the digest size
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in blkcipher_walk_done
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in crypto_chacha20_crypt
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Write in aead_recvmsg
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in strcmp
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 1/4] crypto: exynos - Support Exynos5250+ SoCs
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH] crypto: stm32: fix modular build
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
[PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 1/4] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 0/4] Assorted changes for Exynos PRNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH] crypto: qat - reduce stack size with KASAN
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: AF_ALG - fix race accessing cipher request
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: Add myself as co-maintainer for s5p-sss.c
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: stm32: fix modular build
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH] crypto: stm32: fix module device table name
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] chcr: ensure cntrl is initialized to fix bit-wise or'ing of garabage data
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] chcr: remove unused variables net_device, pi, adap and cntrl
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chelsio: make arrays sgl_ent_len and dsgl_ent_len static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: mcryptd: protect the per-CPU queue with a lock
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: cryptd: make cryptd_max_cpu_qlen module parameter static
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: skcipher - set walk.iv for zero-length inputs
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: caam/qi - use correct print specifier for size_t
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: arm/aes-neonbs Use PTR_ERR_OR_ZERO()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: fix typo in KPP dependency of CRYPTO_ECDH
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 0/4] crypto: inside-secure - set of fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v4 4/4] crypto: inside-secure - do not use areq->result for partial results
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v4 3/4] crypto: inside-secure - fix request allocations in invalidation path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v4 2/4] crypto: inside-secure - free requests even if their handling failed
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v4 1/4] crypto: inside-secure - per request invalidation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/18] crypto: talitos - fixes and performance improvement
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/3] crypto: inside-secure - set of fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v3 2/3] crypto: inside-secure - free requests even if their handling failed
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v3 3/3] crypto: inside-secure - fix request allocations in invalidation path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v3 0/3] crypto: inside-secure - set of fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v3 1/3] crypto: inside-secure - per request invalidation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Martin Willi <martin@xxxxxxxxxxxxxx>
Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Crypto Fixes for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
KASAN: wild-memory-access Write in scatterwalk_copychunks
From
: syzbot <bot+afbe81311aa0da046f1e62a665eccddac254f803@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Jeffrey Walton <noloader@xxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] KEYS: reject NULL restriction string when type is specified
From
: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
Re: [PATCH 00/18] crypto: talitos - fixes and performance improvement
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] KEYS: reject NULL restriction string when type is specified
From
: David Howells <dhowells@xxxxxxxxxx>
AF_ALG: skb limits
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - fix race accessing cipher request
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
[PATCH] crypto: AF_ALG - fix race accessing cipher request
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: Ying Xue <ying.xue@xxxxxxxxxxxxx>
[PATCH] fscrypt: add support for ChaCha20 contents encryption
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
RE: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: Jon Maloy <jon.maloy@xxxxxxxxxxxx>
Re: [ovs-dev] [PATCH 7/8] net: ovs: remove unused hardirq.h
From
: Pravin Shelar <pshelar@xxxxxxx>
Re: [PATCH 4/8] vfs: remove unused hardirq.h
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH 7/8] net: ovs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH 6/8] net: caif: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH 4/8] vfs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH] crypto: null - Get rid of crypto_{get,put}_default_null_skcipher2()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: api - Unexport crypto_larval_lookup()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [crypto 4/8] chtls: CPL handler definition
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Re: [PATCH v9 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
From
: Jyri Sarha <jsarha@xxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [crypto 6/8] chtls: TCB and Key program
From
: Stephan Mueller <smueller@xxxxxxxxxx>
RE: [crypto 6/8] chtls: TCB and Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
From
: Dave Martin <Dave.Martin@xxxxxxx>
RE: [crypto 4/8] chtls: CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [crypto 6/8] chtls: TCB and Key program
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
RE: [crypto 6/8] chtls: TCB and Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH] Fix NULL pointer deref. on no default_rng
From
: Pierre <pinaraf@xxxxxxxxxxxx>
Re: [PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
From
: SUNIL KALLUR RAMEGOWDA <kallur.sunil@xxxxxxxxx>
Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
[PATCH v3 20/20] DO NOT MERGE
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 19/20] crypto: arm64/crct10dif-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 18/20] crypto: arm64/crc32-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 17/20] crypto: arm64/aes-ghash - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 16/20] crypto: arm64/aes-bs - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 15/20] crypto: arm64/aes-blk - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 14/20] crypto: arm64/aes-ccm - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 13/20] crypto: arm64/sha2-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 12/20] crypto: arm64/sha1-ce - yield NEON after every block of input
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 08/20] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 09/20] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 06/20] crypto: arm64/aes-blk - remove configurable interleave
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 07/20] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 05/20] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 04/20] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 03/20] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 02/20] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 01/20] crypto: testmgr - add a new test case for CRC-T10DIF
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 00/20] crypto: arm64 - play nice with CONFIG_PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
locking in prng
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Dave P Martin <Dave.Martin@xxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH RFC 4/4] crypto: stm32: convert to the new crypto engine API
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
From
: James Hogan <james.hogan@xxxxxxxx>
[PATCH v9 2/8] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 8/8] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 3/8] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 4/8] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 6/8] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 5/8] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
[PATCH v9 0/8] Add io{read|write}64 to io-64-atomic headers
From
: Logan Gunthorpe <logang@xxxxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto: exynos - Icrease the priority of the driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH] crypto: exynos - Icrease the priority of the driver
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH] crypto: exynos - Icrease the priority of the driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [crypto 4/8] chtls: CPL handler definition
From
: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 4.9-stable] Revert "crypto: caam - get rid of tasklet"
From
: Greg KH <greg@xxxxxxxxx>
[PATCH 4.9-stable] Revert "crypto: caam - get rid of tasklet"
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [crypto 4/8] chtls: CPL handler definition
From
: Stefano Brivio <sbrivio@xxxxxxxxxx>
Announce loop-AES-v3.7m file/swap crypto package
From
: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [RFC] crypto: exynos - Icrease the priority of the driver
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [crypto 6/8] chtls: TCB and Key program
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[RFC] crypto: exynos - Icrease the priority of the driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 2/3] crypto: exynos - Improve performance of PRNG
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 0/3] Assorted changes for Exynos PRNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
From
: Dave Martin <Dave.Martin@xxxxxxx>
[crypto 8/8] Kconfig Makefile
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 7/8] chtls: structure and macro definiton
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 4/8] chtls: CPL handler definition
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 6/8] chtls: TCB and Key program
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 5/8] chtls: Inline crypto request for Tx.
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 3/8] chtls: ulp for Inline TLS processing
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 2/8] chcr: changes to chcr driver
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 1/8] cxgb4: Inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto 0/8] Chelsio inline TLS
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto] chcr: fix a type cast error
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH] crypto: chcr: select CRYPTO_GF128MUL
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 02/45] drivers: crypto: remove duplicate includes
From
: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
[Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 10/38] crypto: ccp: Define SEV userspace ioctl and command id
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v9 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]