Linux Crypto
[Prev Page][Next Page]
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- [PATCH] random: add chacha8_block and swtich the rng to it
- From: Aaron Toponce <aaron.toponce@xxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 0/2] caam: init-clk based on caam-page0-access
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH -next 3/4] crypto: starfive: Do not free stack buffer
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] drivers: crypto: caam: i.MX8ULP donot have CAAM page0 access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 2/2] drivers: crypto: caam: i.MX8ULP donot have CAAM page0 access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 1/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 1/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 0/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v4 0/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH -next 4/4] crypto: starfive: Use fallback for unaligned dma access
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH -next 2/4] crypto: starfive: Skip unneeded fallback allocation
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH -next 1/4] crypto: starfive - Skip dma setup for zeroed message
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- [PATCH -next 0/4] crypto: starfive - Minor fixes for AES and RSA
- From: Jia Jie Ho <jiajie.ho@xxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in aes_encrypt (5)
- From: syzbot <syzbot+aeb14e2539ffb6d21130@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 5/5] crypto: atmel-sha204a - provide the otp content
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH 4/5] crypto: atmel-sha204a - add reading from otp zone
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH 3/5] crypto: atmel-i2c - rename read function
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH 2/5] crypto: atmel-sha204a - remove unused includes
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH 1/5] crypto: atmel-i2 - add missing arg description
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- [PATCH 0/5] crypto: atmel-sha204a - read out otp zone
- From: Lothar Rubusch <l.rubusch@xxxxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: ecc - Protect ecc_digits_from_bytes from reading too many bytes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net] Fix a potential infinite loop in extract_user_to_sg()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v14 22/22] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 0/9] Turris Omnia MCU driver
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxx>
- Re: (subset) [PATCH v7 0/5] Add Tegra Security Engine driver
- From: "Thierry Reding" <thierry.reding@xxxxxxxxx>
- Re: (subset) [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- [RFC PATCH 6/6] btrfs: zlib: add support for zlib-deflate through acomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 5/6] crypto: qat - change compressor settings for QAT GEN4
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 4/6] Revert "crypto: qat - remove unused macros in qat_comp_alg.c"
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 3/6] Revert "crypto: qat - Remove zlib-deflate"
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 2/6] Revert "crypto: deflate - Remove zlib-deflate"
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 1/6] Revert "crypto: testmgr - Remove zlib-deflate"
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [RFC PATCH 0/6] btrfs: offload zlib-deflate to accelerators
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] crypto: x86/aes-gcm - simplify GCM hash subkey derivation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - simplify GCM hash subkey derivation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - delete unused GCM assembly code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - delete unused GCM assembly code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - simplify loop in xts_crypt_slowpath()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] hwrng: stm32 - use logical OR in conditional
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: ecdh & ecc: Fix private key byte ordering issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tegra - Fix some error codes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: starfive: Restore sort order
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - validate slices count returned by FW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aead,cipher - zeroize key buffer after use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-ce - Simplify round key load sequence
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tegra-se - Convert to platform remove callback returning void
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/8] crypto: shash - add support for finup2x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] Fix a potential infinite loop in extract_user_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v7] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v3 7/7] Enable Driver compilation in crypto Kconfig and Makefile
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 6/7] Add SPAcc node zynqmp dts
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 5/7] Add SPAcc Kconfig and Makefile
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 4/7] Add SPAcc aead support
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 3/7] Add SPAcc ahash support
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 2/7] Enable SPAcc AUTODETECT
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 1/7] Add SPAcc Skcipher support
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v3 0/7] Add SPAcc crypto driver support
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 21/25] nvdimm: virtio_pmem: drop owner assignment
- From: Ira Weiny <ira.weiny@xxxxxxxxx>
- Re: [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH net] Fix a potential infinite loop in extract_user_to_sg()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH net] Fix a potential infinite loop in extract_user_to_sg()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 1/2] certs: Move RSA self-test data to separate file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 16/22] KVM: x86: Implement gmem hook for determining max NPT mapping level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 17/22] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 22/22] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 06/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 05/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH bpf-next v10 0/4] BPF crypto API framework
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v10 1/4] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v10 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v10 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- [PATCH v4 17/71] crypto: x86/twofish - Switch to new Intel CPU model defines
- From: Tony Luck <tony.luck@xxxxxxxxx>
- [PATCH v4 16/71] crypto: x86/poly1305 - Switch to new Intel CPU model defines
- From: Tony Luck <tony.luck@xxxxxxxxx>
- [PATCH v7 7/9] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v7 6/9] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v7 0/9] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 06/13] of: property: fw_devlink: Add support for "access-controller"
- From: Alexandre TORGUE <alexandre.torgue@xxxxxxxxxxx>
- Re: [PATCH v9 06/13] of: property: fw_devlink: Add support for "access-controller"
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- RE: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Add missing dependencies of FIPS_SIGNATURE_SELFTEST
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Add missing dependencies of FIPS_SIGNATURE_SELFTEST
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Add missing dependency on CRYPTO_SIG
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Add missing dependency on CRYPTO_SIG
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v14 28/22] [SQUASH] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- Re: [PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 29/22] [SQUASH] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 28/22] [SQUASH] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 27/22] [SQUASH] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 26/22] [SQUASH] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 25/22] [SQUASH] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 24/22] [SQUASH] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 23/22] [SQUASH] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 00/11] Turris Omnia MCU driver
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- Re: [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Andy Shevchenko <andy@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: stm32/cryp - use dma when possible.
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v2 2/3] crypto: stm32/cryp - increase priority
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v2 0/3] crypto: stm32/cryp - Improve stm32-cryp driver
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- Re: [PATCH bpf-next v10 1/4] bpf: make common crypto API for TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH AUTOSEL 6.6 05/16] powerpc/crypto/chacha-p10: Fix failure on non Power10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 05/18] powerpc/crypto/chacha-p10: Fix failure on non Power10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Add missing dependencies of FIPS_SIGNATURE_SELFTEST
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- RE: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/sec2 - fix for register offset
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/debugfs - mask the unnecessary info from the dump
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon - fix reg offset issue and cleanup dump information
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH bpf-next v10 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v10 3/4] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v10 1/4] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v10 2/4] bpf: crypto: add skcipher to bpf crypto
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v10 0/4] BPF crypto API framework
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH bpf-next v9 1/4] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [linus:master] [crypto] 203a6763ab: Kernel_panic-not_syncing:Certs_selftest#:pkcs7_verify()=
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Add missing dependencies of FIPS_SIGNATURE_SELFTEST
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Add missing dependency on CRYPTO_SIG
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 8/8] dm-verity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 7/8] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/8] fsverity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: arm64/sha256-ce - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: x86/sha256-ni - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: testmgr - add tests for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: testmgr - generate power-of-2 lengths more often
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: shash - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/8] Optimize dm-verity and fsverity using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: qat - specify firmware files for 402xx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: stm32/cryp - use dma when possible.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [linus:master] [crypto] 203a6763ab: Kernel_panic-not_syncing:Certs_selftest#:pkcs7_verify()=
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v9a 10/14] x86/cpu/keylocker: Check Gather Data Sampling mitigation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in lzo1x_1_do_compress (2)
- From: syzbot <syzbot+9a049ebdaacbb076e50a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 08/22] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 07/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 06/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 05/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 04/22] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 02/22] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 22/22] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 01/22] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 20/22] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 19/22] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 18/22] KVM: SVM: Add module parameter to enable SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 17/22] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 16/22] KVM: x86: Implement gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 15/22] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 14/22] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 13/22] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 12/22] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 11/22] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 10/22] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2] crypto: x86/aes-gcm - simplify GCM hash subkey derivation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-gcm - simplify GCM hash subkey derivation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aes-gcm - simplify GCM hash subkey derivation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aes-gcm - delete unused GCM assembly code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aes-xts - simplify loop in xts_crypt_slowpath()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/2] certs: Move RSA self-test data to separate file
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH v2 2/2] certs: Add ECDSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH bpf-next v9 3/4] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v9 1/4] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v9 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v9 3/4] selftests: bpf: crypto skcipher algo selftests
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v9 1/4] bpf: make common crypto API for TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/8] crypto: shash - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 16/26] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 08/26] KVM: SEV: Add initial SEV-SNP support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tegra - Fix some error codes
- From: "Thierry Reding" <thierry.reding@xxxxxxxxx>
- Re: [PATCH bpf-next v9 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86/aes-xts - additional tuning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - handle CTS encryption more efficiently
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32/hash - add full DMA support for stm32mpx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Improve error logging in the qat driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: x86/sha256-ni - cleanup and optimization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - implement dh fallback for primes > 4K
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - access round keys using single-byte offsets
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: octeontx2 - add missing check for dma_map_single
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: ecdh & ecc: Fix private key byte ordering issues
- From: Hubert Kario <hkario@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] crypto: shash - add support for finup2x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 1/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/3] hwrng: stm32 - put IP into RPM suspend on failure
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 3/3] hwrng: stm32 - repair clock handling
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 1/3] hwrng: stm32 - use logical OR in conditional
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v9a 10/14] x86/cpu/keylocker: Check Gather Data Sampling mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 22/29] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 07/26] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 08/26] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 06/26] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 05/26] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 03/26] [TEMP] x86/CPU/AMD: Track SNP host status with cc_platform_*()
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 02/26] [TEMP] x86/cc: Add cc_platform_set/_clear() helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 26/26] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 25/26] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 24/26] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 23/26] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 22/26] KVM: SVM: Add module parameter to enable SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 21/26] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 01/26] [TEMP] x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 20/26] KVM: x86: Implement gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 19/26] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 18/26] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 17/26] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 16/26] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 15/26] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 14/26] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 13/26] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 12/26] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 11/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: ecdh & ecc - Initialize ctx->private_key in proper byte order
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 0/2] crypto: ecdh & ecc: Fix private key byte ordering issues
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] drivers: crypto: caam: i.MX8ULP donot have CAAM page0 access
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v3 1/2] caam: init-clk based on caam-page0-access
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 1/3] crypto: stm32/cryp - use dma when possible.
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH 3/3] crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH 0/3] crypto: stm32/cryp - Improve stm32-cryp driver
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- [PATCH 2/3] crypto: stm32/cryp - increase priority
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- Re: [PATCH] x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v6 09/11] platform: cznic: turris-omnia-mcu: Add support for digital message signing via debugfs
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v6 07/11] platform: cznic: turris-omnia-mcu: Add support for MCU provided TRNG
- From: Marek Behún <kabel@xxxxxxxxxx>
- [PATCH v6 00/11] Turris Omnia MCU driver
- From: Marek Behún <kabel@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: tegra - Fix some error codes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH 2/2] certs: Guard RSA signature verification self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: ecdh & ecc - Initialize ctx->private_key in proper byte order
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/2] crypto: tegra - Fix some error codes
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tegra - Fix some error codes
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 1/2] crypto: tegra - Fix some error codes
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Easwar Hariharan <eahariha@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: ecdh & ecc - Initialize ctx->private_key in proper byte order
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto: ecdh & ecc: Fix private key byte ordering issues
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] virt: vmgenid: add support for devicetree bindings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 5/5] virt: vmgenid: add support for devicetree bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v6 4/5] dt-bindings: rng: Add vmgenid support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- Re: [PATCH v6 4/5] dt-bindings: rng: Add vmgenid support
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 4/5] dt-bindings: rng: Add vmgenid support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- Re: [PATCH v6 5/5] virt: vmgenid: add support for devicetree bindings
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v6 1/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v6 0/1] vfio/qat: Add vfio_pci driver for Intel QAT SR-IOV VF device
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- Re: [PATCH v6 4/5] dt-bindings: rng: Add vmgenid support
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v5 5/5] virt: vmgenid: add support for devicetree bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v5 4/5] dt-bindings: rng: Add vmgenid support
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v5 4/5] dt-bindings: rng: Add vmgenid support
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v6 5/5] virt: vmgenid: add support for devicetree bindings
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v6 4/5] dt-bindings: rng: Add vmgenid support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v6 3/5] virt: vmgenid: enable driver regardless of ACPI config
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v6 2/5] virt: vmgenid: change implementation to use a platform driver
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v6 1/5] virt: vmgenid: re-arrange code to make review easier
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v6 0/5] virt: vmgenid: Add devicetree bindings support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- Re: [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: Babis Chalios <bchalios@xxxxxxxxx>
- Re: [PATCH v5 0/5] virt: vmgenid: Add devicetree bindings support
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v5 4/5] dt-bindings: rng: Add vmgenid support
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: Alexander Graf <graf@xxxxxxxxx>
- [PATCH v5 5/5] virt: vmgenid: add support for devicetree bindings
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v5 4/5] dt-bindings: rng: Add vmgenid support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v5 3/5] virt: vmgenid: enable driver regardless of ACPI config
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v5 2/5] virt: vmgenid: change implementation to use a platform driver
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v5 1/5] virt: vmgenid: rearrange code to make review easier
- From: Babis Chalios <bchalios@xxxxxxxxx>
- [PATCH v5 0/5] virt: vmgenid: Add devicetree bindings support
- From: Babis Chalios <bchalios@xxxxxxxxx>
- Re: [PATCH bpf-next v9 1/4] bpf: make common crypto API for TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-ce - Simplify round key load sequence
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aead, cipher - zeroize key buffer after use
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH bpf-next v9 4/4] selftests: bpf: crypto: add benchmark for crypto functions
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v9 2/4] bpf: crypto: add skcipher to bpf crypto
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v9 3/4] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v9 1/4] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v9 0/4] BPF crypto API framework
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aead, cipher - zeroize key buffer after use
- From: "Mothershead, Hailey" <hailmo@xxxxxxxxxx>
- Re: [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: starfive: Restore sort order
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: starfive: Restore sort order
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm: change inlined allocation helpers to account at the call site
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 2/2] certs: Guard RSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- [PATCH] crypto: qat - validate slices count returned by FW
- From: Lucas Segarra Fernandez <lucas.segarra.fernandez@xxxxxxxxx>
- Re: [PATCH 2/2] certs: Guard RSA signature verification self-test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/7] security: Remove the now superfluous sentinel element from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- [PATCH v3 2/2] drivers: crypto: caam: i.MX8ULP donot have CAAM page0 access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v3 1/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v3 0/2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH 2/2] certs: Guard RSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- [PATCH 1/2] certs: Add ECDSA signature verification self-test
- From: Joachim Vandersmissen <git@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH v9 00/14] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v9 00/14] x86: Support Key Locker
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: aead,cipher - zeroize key buffer after use
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: aead,cipher - zeroize key buffer after use
- From: Hailey Mothershead <hailmo@xxxxxxxxxx>
- Re: [PATCH v9 00/14] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- [RFC PATCH 8/8] dm-verity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 7/8] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 6/8] fsverity: improve performance by using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 5/8] crypto: arm64/sha256-ce - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 4/8] crypto: x86/sha256-ni - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 3/8] crypto: testmgr - add tests for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 2/8] crypto: testmgr - generate power-of-2 lengths more often
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 1/8] crypto: shash - add support for finup2x
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 0/8] Optimize dm-verity and fsverity using multibuffer hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH 2/7] security: Remove the now superfluous sentinel element from ctl_table array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 19/23] dt-bindings: crypto: meson: support new SoC's
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 2/7] security: Remove the now superfluous sentinel element from ctl_table array
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/7] security: Remove the now superfluous sentinel element from ctl_table array
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] security: Remove the now superfluous sentinel element from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- [PATCH] crypto: arm64/aes-ce - Simplify round key load sequence
- From: Ard Biesheuvel <ardb+git@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86/aes-xts - additional tuning
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH v2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [PATCH] crypto: tegra-se - Convert to platform remove callback returning void
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH] crypto: tegra-se - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 2/2] crypto: ecdh & ecc - Initialize ctx->private_key in proper byte order
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ecdh - Pass private key in proper byte order to check valid key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: ecdh & ecc: Fix private key byte ordering issues
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] X.509: Introduce scope-based x509_certificate allocation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/3] crypto: x86/aes-xts - eliminate a few more instructions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: x86/aes-xts - optimize size of instructions operating on lengths
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: x86/aes-xts - handle AES-128 and AES-192 more efficiently
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: x86/aes-xts - additional tuning
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 00/10] crypto: qat - enable QAT GEN4 SRIOV VF live migration for QAT GEN4
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [RESEND PATCH] raid6test: Use str_plural() to fix Coccinelle warning
- From: Thorsten Blum <thorsten.blum@xxxxxxxxxx>
- Re: Build regressions/improvements in v6.9-rc1
- From: Andreas Larsson <andreas@xxxxxxxxxxx>
- [PATCH] crypto: x86/aes-xts - handle CTS encryption more efficiently
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 00/10] crypto: qat - enable QAT GEN4 SRIOV VF live migration for QAT GEN4
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: stm32/hash - add full DMA support for stm32mpx
- From: Maxime MERE <maxime.mere@xxxxxxxxxxx>
- Re: [PATCH v2] caam: init-clk based on caam-page0-access
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH v2 2/2] crypto: qat - improve error logging to be consistent across features
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - improve error message in adf_get_arbiter_mapping()
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH v2 0/2] Improve error logging in the qat driver
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- Re: [PATCH v3 05/10] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Yangyu Chen <cyy@xxxxxxxxxxxx>
- Re: [PATCH v7 00/23] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/23] Support more Amlogic SoC families in crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/23] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] crypto: riscv - add vector crypto accelerated ChaCha20
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - make non-AVX implementation use new glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] X.509: Introduce scope-based x509_certificate allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] crypto: hisilicon - Optimize and fix some driver processes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: x86 - add missing vzeroupper instructions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: iaa - Use cpumask_weight() when rebalancing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/13] Add support for NIST P521 to ecdsa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 24/34] crypto: ccp - drop platform ifdef checks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: qat: Fix spelling mistake "Invalide" -> "Invalid"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algboss: remove NULL check in cryptomgr_schedule_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc: remove checks in crypto_ecdh_shared_secret() and ecc_make_pub_key()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] Enable Driver compilation in crypto Kconfig and Makefile file
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v2 1/4] Add SPAcc driver to Linux kernel
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v2 3/4] Add SPAcc dts overlay
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v2 2/4] Add SPACC Kconfig and Makefile
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- [PATCH v2 0/4] Add spacc crypto driver support
- From: Pavitrakumar M <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: ecdh - zeroize crpytographic keys after use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: aead,cipher - zeroize key buffer after use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/23] Support more Amlogic SoC families in crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: aead,cipher - zeroize key buffer after use
- From: Hailey Mothershead <hailmo@xxxxxxxxxx>
- [PATCH 1/2] crypto: ecdh - zeroize crpytographic keys after use
- From: Hailey Mothershead <hailmo@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: x86/sha256-ni - rename some register aliases
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: x86/sha256-ni - cleanup and optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: x86/sha256-ni - optimize code size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: x86/sha256-ni - simplify do_4rounds
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: x86/sha256-ni - convert to use rounds macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: x86/sha256-ni - convert to use rounds macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: qat - improve error logging to be consistent across features
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - improve error message in adf_get_arbiter_mapping()
- From: Adam Guerin <adam.guerin@xxxxxxxxx>
- [PATCH v7 23/23] arch: arm64: dts: meson: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 22/23] arch: arm64: dts: meson: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 21/23] arch: arm64: dts: meson: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 20/23] arch: arm64: dts: meson: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 19/23] dt-bindings: crypto: meson: support new SoC's
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 18/23] arch: arm64: dts: meson: gxl: correct crypto node definition
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 17/23] dt-bindings: crypto: meson: remove clk and second interrupt line for GXL
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 16/23] drivers: crypto: meson: add support for A1-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 14/23] drivers: crypto: meson: add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 15/23] drivers: crypto: meson: add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 13/23] drivers: crypto: meson: use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 12/23] drivers: crypto: meson: add support for AES-CTR
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 11/23] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 10/23] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 09/23] drivers: crypto: meson: process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 08/23] drivers: crypto: meson: cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 07/23] drivers: crypto: meson: move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 06/23] drivers: crypto: meson: drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 05/23] drivers: crypto: meson: move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 04/23] drivers: crypto: meson: add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 03/23] drivers: crypto: meson: remove clock input
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 02/23] drviers: crypto: meson: add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 01/23] drivers: crypto: meson: don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v7 00/23] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 29/29] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: qat - implement dh fallback for primes > 4K
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v9 00/13] Introduce STM32 Firewall framework
- From: Alexandre TORGUE <alexandre.torgue@xxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: x86/sha256-ni - convert to use rounds macros
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH v6 11/23] drivers: crypto: meson: introduce hasher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] Add spacc crypto driver support
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 28/29] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v12 27/29] crypto: ccp: Add the SNP_VLEK_LOAD command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v12 26/29] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH v2] caam: init-clk based on caam-page0-access
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v6 11/23] drivers: crypto: meson: introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] virtio: store owner from modules with register_virtio_driver()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- [PATCH v2] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 00/25] virtio: store owner from modules with register_virtio_driver()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- RE: [PATCH] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [PATCH] caam: init-clk based on caam-page0-access
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH 1/2] crypto: x86/sha256-ni - convert to use rounds macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: x86/nh-avx2 - add missing vzeroupper
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: x86/sha512-avx2 - add missing vzeroupper
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: x86/sha256-avx2 - add missing vzeroupper
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v9 00/13] Introduce STM32 Firewall framework
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 0/7] sysctl: Remove sentinel elements from misc directories
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: x86/sha256-ni - convert to use rounds macros
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - access round keys using single-byte offsets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH 2/2] crypto: x86/sha256-ni - optimize code size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: x86/sha256-ni - convert to use rounds macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: x86/sha256-ni - cleanup and optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - access round keys using single-byte offsets
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 15/25] misc: nsm: drop owner assignment
- From: Alexander Graf <graf@xxxxxxxxxx>
- RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: Incorrect use of CRYPTO_ALG_ASYNC in crypto_alloc_sync_skcipher()?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Incorrect use of CRYPTO_ALG_ASYNC in crypto_alloc_sync_skcipher()?
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH] crypto: x86/aes-xts - access round keys using single-byte offsets
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] caam: init-clk based on caam-page0-access
- From: Francesco Dolcini <francesco@xxxxxxxxxx>
- RE: [PATCH] caam: init-clk based on caam-page0-access
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXTERNAL] [PATCH] crypto: octeontx2 - add missing check for dma_map_single
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- [PATCH] crypto: x86/aes-xts - access round keys using single-byte offsets
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: s(h)aving 16 byte constant off arch/x86/crypto/sha1_ni_asm.S
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: s(h)aving 16 byte constant off arch/x86/crypto/sha1_ni_asm.S
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- [PATCH v2 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: s(h)aving 16 byte constant off arch/x86/crypto/sha1_ni_asm.S
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- [PATCH 1/2] crypto: s(h)aving 40+ bytes off arch/x86/crypto/sha256_ni_asm.S
- From: "Stefan Kanthak" <stefan.kanthak@xxxxxxxx>
- Re: [PATCH v9 00/13] Introduce STM32 Firewall framework
- From: Alexandre TORGUE <alexandre.torgue@xxxxxxxxxxx>
- RE: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH] crypto: octeontx2 - add missing check for dma_map_single
- From: Chen Ni <nichen@xxxxxxxxxxx>
- Re: [PATCH v9 00/14] x86: Support Key Locker
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 00/14] x86: Support Key Locker
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v9a 07/14] x86/cpu/keylocker: Load a wrapping key at boot time
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v9a 11/14] x86/cpu/keylocker: Check Register File Data Sampling mitigation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v9a 10/14] x86/cpu/keylocker: Check Gather Data Sampling mitigation
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH] crypto: x86/aes-xts - make non-AVX implementation use new glue code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 7/9] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 4/9] crypto: hisilicon/debugfs - Fix the processing logic issue in the debugfs creation
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 8/9] crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: hisilicon/qm - Add the err memory release process to qm uninit
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 1/9] crypto: hisilicon/sec - Add the condition for configuring the sriov function
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 6/9] crypto: hisilicon - Adjust debugfs creation and release order
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 5/9] crypto: hisilicon/qm - Add the default processing branch
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 3/9] crypto: hisilicon/sgl - Delete redundant parameter verification
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 0/9] crypto: hisilicon - Optimize and fix some driver processes
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v2 2/9] crypto: hisilicon/debugfs - Fix debugfs uninit process issue
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 23/25] scsi: virtio: drop owner assignment
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- [PATCH 3/3] crypto: x86/sha512-avx2 - add missing vzeroupper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/3] crypto: x86/sha256-avx2 - add missing vzeroupper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: x86 - add missing vzeroupper instructions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: x86/nh-avx2 - add missing vzeroupper
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: iaa - Add deflate-canned compression algorithm
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: iaa - Use cpumask_weight() when rebalancing
- From: Tom Zanussi <tom.zanussi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v3] X.509: Introduce scope-based x509_certificate allocation
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 14/19] i2c: nomadik: drop owner assignment
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] dt-bindings: crypto: ti,omap-sham: Convert to dtschema
- From: Animesh Agarwal <animeshagarwal28@xxxxxxxxx>
- Re: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto: Remove the now superfluous sentinel element from ctl_table array
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: jitter - Replace http with https
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ecdh - explicitly zeroize private_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: jitter - Remove duplicate word in comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitter - Use kvfree_sensitive() to fix Coccinelle warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] dt-bindings: crypto: ti,omap-sham: Convert to dtschema
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] Add spacc crypto driver support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Add new compression modes for zlib and IAA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/23] drivers: crypto: meson: introduce hasher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 10/23] drivers: crypto: meson: avoid kzalloc in engine thread
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: (subset) [PATCH 0/2] Add Inline Crypto Engine for SC7280 UFS
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v2 6/6] crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH 1/1] mm: change inlined allocation helpers to account at the call site
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v8 00/13] Add support for NIST P521 to ecdsa
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 05/13] crypto: ecc - Add nbits field to ecc_curve structure
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 13/13] crypto: x509 - Add OID for NIST P521 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 12/13] crypto: asymmetric_keys - Adjust signature size calculation for NIST P521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 11/13] crypto: ecdsa - Register NIST P521 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 05/13] crypto: ecc - Add nbits field to ecc_curve structure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 04/13] crypto: ecdsa - Extend res.x mod n calculation for NIST P521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 03/13] crypto: ecdsa - Adjust tests on length of key parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 07/13] crypto: ecc - Add special case for NIST P521 in ecc_point_mult
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 02/13] crypto: ecdsa - Convert byte arrays with key coordinates to digits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 10/13] crypto: ecdsa - Rename keylen to bufsize where necessary
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 08/13] crypto: ecc - Add NIST P521 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 06/13] crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 09/13] crypto: ecdsa - Replace ndigits with nbits where precision is needed
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 00/13] Add support for NIST P521 to ecdsa
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 01/13] crypto: ecc - Use ECC_CURVE_NIST_P192/256/384_DIGITS where possible
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] gpio: virtio: drop owner assignment
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH 15/19] hwrng: nomadik: drop owner assignment
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- RE: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v2 21/25] nvdimm: virtio_pmem: drop owner assignment
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 8/9] crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] padata: Disable BH when taking works lock on MT path
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 24/34] crypto: ccp - drop platform ifdef checks
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 24/34] crypto: ccp - drop platform ifdef checks
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v12 12/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 8/9] crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 3/9] crypto: hisilicon/sgl - Delete redundant parameter verification
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 6/9] crypto: hisilicon - Adjust debugfs creation and release order
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 1/9] crypto: hisilicon/sec - Add the condition for configuring the sriov function
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 9/9] crypto: hisilicon/debugfs - Add the err memory release process to qm uninit
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 0/9] crypto: hisilicon - Optimize and fix some driver processes
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 7/9] crypto: hisilicon/sec - Fix memory leak for sec resource release
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 5/9] crypto: hisilicon/qm - Add the default processing branch
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 2/9] crypto: hisilicon/debugfs - Fix debugfs uninit process issue
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH 4/9] crypto: hisilicon/debugfs - Fix the processing logic issue in the debugfs creation
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v7 5/5] arm64: tegra: Add Tegra Security Engine DT nodes
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v7 4/5] arm64: defconfig: Enable Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v7 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v7 2/5] gpu: host1x: Add Tegra SE to SID table
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v7 1/5] dt-bindings: crypto: Add Tegra Security Engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH v7 0/5] Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [syzbot] [crypto?] KMSAN: uninit-value in __crc32c_le_base (4)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] padata: Disable BH when taking works lock on MT path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 24/34] crypto: ccp - drop platform ifdef checks
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/34] address all -Wunused-const warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_sha3_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Faster AES-XTS on modern x86_64 CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 24/25] fuse: virtio: drop owner assignment
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v2 23/25] scsi: virtio: drop owner assignment
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v2 19/25] vsock/virtio: drop owner assignment
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v2 06/25] virtio_blk: drop owner assignment
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_sha3_update
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] crypto: qat: Fix spelling mistake "Invalide" -> "Invalid"
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH][next] crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_sha3_update
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v6 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] amba: store owner from modules with amba_driver_register()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 3/5] crypto: tegra: Add Tegra Security Engine driver
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_sha3_update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH][next] crypto: qat: Fix spelling mistake "Invalide" -> "Invalid"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [EXT] caam test failures with libkcapi
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- RE: [EXT] caam test failures with libkcapi
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v2 25/25] sound: virtio: drop owner assignment
- From: Anton Yakovlev <anton.yakovlev@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] Add SPAcc driver to Linux kernel
- From: Pavitrakumar Managutte <pavitrakumarm@xxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]