Linux Crypto
[Prev Page][Next Page]
- [PATCH 05/26] staging: ccree: pick alloc mem flags based on req flags
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/26] staging: ccree: copy larval digest from RAM
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/26] staging: ccree: breakup send_request
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/26] stating: ccree: revert "staging: ccree: fix leak of import() after init()"
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/26] staging: ccree: check DMA pool buf !NULL before free
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/26] staging: ccree: handle end of sg list gracefully
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 16/26] staging: ccree: remove unused field
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 17/26] staging: ccree: use array for double buffer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 25/26] staging: ccree: remove unneeded includes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 26/26] staging: ccree: update TODO
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 24/26] staging: ccree: use a consistent file naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 19/26] staging: ccree: do not map bufs in ahash_init
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 20/26] staging: ccree: fix indentation of func params
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 21/26] staging: ccree: fold common code into service func
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 22/26] staging: ccree: put pointer next to var name
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 23/26] stating: ccree: fix allocation of void sized buf
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 18/26] staging: ccree: allocate hash bufs inside req ctx
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 15/26] staging: ccree: use Makefile to include PM code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/26] staging: ccree: failing the suspend is not an error
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/26] staging: ccree: add backlog processing
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/26] staging: ccree: remove unused leftover field
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/26] staging: ccree: tag debugfs init/exit func properly
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/26] staging: ccree: fold reg common defines into driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/26] staging: ccree: SPDXify driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/26] staging: ccree: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: change `guard` to unsigned char
- From: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
- [PATCH] crypto: chacha20 - use rol32() macro from bitops.h
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/3] crypto: x86/salsa20 - cleanup and convert to skcipher API
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/3] crypto: salsa20 - export generic helpers
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/3] crypto: salsa20-generic - cleanup and convert to skcipher API
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/3] crypto: salsa20 - cleanup and convert to skcipher API
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
- From: Himanshu Jha <himanshujha199640@xxxxxxxxx>
- Re: [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] crypto: Use zeroing memory allocator instead of allocator/memset
- From: Himanshu Jha <himanshujha199640@xxxxxxxxx>
- Re: INFO: task hung in aead_recvmsg
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] padata: add SPDX identifier
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: algapi - fix NULL dereference in crypto_remove_spawns()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/3] crypto: x86/poly1305 - remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/3] crypto: poly1305 - remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/3] crypto: poly1305 - use unaligned access macros to output digest
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/3] crypto: poly1305 - get rid of cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: algapi - remove unused notifications
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: algapi - convert cra_refcnt to refcount_t
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] staging: ccree: ssi_hash: remove unnecessary parentheses
- From: Elad Wexler <elad.wexler@xxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32 - Use standard CONFIG name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: scomp - delete unused comments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: caam - constify key data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: tcrypt: fix and add multi buf speed tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] padata: add SPDX identifier
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Decreasing time for `rsa_init`
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: inside-secure - 2 extra fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - fix hash when length is a multiple of a block
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - avoid unmapping DMA memory that was not mapped
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: Decreasing time for `rsa_init`
- From: Paul Menzel <pmenzel+linux-crypto@xxxxxxxxxxxxx>
- Re: [QUESTION] hash import and request initialization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [QUESTION] hash import and request initialization
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: INFO: task hung in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: INFO: task hung in lock_sock_nested
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v1] crypto: crypto4xx - perform aead icv check in the driver
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 4/4] crypto: crypto4xx - kill MODULE_NAME
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 3/4] crypto: crypto4xx - fix missing irq devname
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 2/4] crypto: crypto4xx - support Revision B parts
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH v1 1/4] crypto: crypto4xx - shuffle iomap in front of request_irq
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH v5] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: KASAN: use-after-free Read in __list_del_entry_valid (2)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: wild-memory-access Write in scatterwalk_copychunks
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha3_update (2)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha3_update (2)
- From: syzbot <bot+80f661b525da04e7baaef60ee883f18be36f3942@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 00/17] crypto: inside-secure - various improvements
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- [PATCH v4] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: inside-secure - set of fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto] crypto: aesni - add wrapper for generic gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto] crypto: aesni - fix typo in generic_gcmaes_decrypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] crypto: inside-secure - various improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Assorted changes for Exynos PRNG driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: seqiv - Remove unused alg/spawn variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: echainiv - Remove unused alg/spawn variable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: artpec6: set correct iv size for gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gf128mul - remove incorrect comment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - reduce stack size with KASAN
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: null - Get rid of crypto_{get,put}_default_null_skcipher2()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Unexport crypto_larval_lookup()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: exynos - Icrease the priority of the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto] chcr: fix a type cast error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/45] drivers: crypto: remove duplicate includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pcrypt - fix freeing pcrypt instances
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2 - cure use after free
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20poly1305 - validate the digest size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chcr: select CRYPTO_GF128MUL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32 - Use standard CONFIG name
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Ralf Baechle <ralf@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - limit mask and type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - limit mask and type
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - limit mask and type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: fix type mismatch warning
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: fix __dump_byte_array() declaration mismatch
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] staging: ccree: fix type mismatch warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] padata: add SPDX identifier
- From: Cheah Kok Cheong <thrust73@xxxxxxxxx>
- Re: [PATCH 1/2] padata: Remove FSF address
- From: Cheah Kok Cheong <thrust73@xxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: pcrypt - fix freeing pcrypt instances
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: Remove FSF address
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v3 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/3] crypto: tools: Add cryptostat userspace
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in hmac_init_tfm
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in socket_file_ops
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: pcrypt - fix freeing pcrypt instances
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Jakub Jelinek <jakub@xxxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] padata: Remove FSF address
- From: Cheah Kok Cheong <thrust73@xxxxxxxxx>
- Re: [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] [RFT] crypto: aes-generic - turn off -ftree-pre and -ftree-sra
- From: Arnd Bergmann <arnd@xxxxxxxx>
- BUG: unable to handle kernel paging request in socket_file_ops
- From: syzbot <bot+cd76df3adeb2edd4836f7b3ef94d32d710c28421@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] padata: Remove FSF address
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- [PATCH 2/2] padata: Remove redundant export.h header
- From: Cheah Kok Cheong <thrust73@xxxxxxxxx>
- [PATCH 1/2] padata: Remove FSF address
- From: Cheah Kok Cheong <thrust73@xxxxxxxxx>
- [PATCH RFC 1/3] crypto: Prevent to register duplicate cra_driver_name
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH RFC 2/3] crypto: Implement a generic crypto statistics
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH RFC 3/3] crypto: tools: Add cryptostat userspace
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH RFC 0/3] crypto: Implement a generic crypto statistics
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] Fix NULL pointer deref. on no default_rng
- From: Pierre <pinaraf@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] iommu/amd - Set the device table entry PPR bit for IOMMU V2 devices
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: stm32 - Use standard CONFIG name
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH] staging: ccree: fix __dump_byte_array() declaration mismatch
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH] iommu/amd - Set the device table entry PPR bit for IOMMU V2 devices
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC crypto v3 9/9] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 7/9] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 6/9] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 5/9] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 4/9] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 3/9] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 2/9] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 1/9] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v3 0/9] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] checkpatch: add *_ON_STACK to $declaration_macros
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH RESEND] checkpatch: add *_ON_STACK to declaration_macros
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_aead_free_instance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH RESEND] checkpatch: add *_ON_STACK to declaration_macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- KASAN: use-after-free Read in crypto_aead_free_instance
- From: syzbot <bot+e5e6fab2d4dc3d9877ac240fed364027bb960ad0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: use size_t consistently
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] staging: ccree: use size_t consistently
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: scomp - delete unused comments
- From: Zhou Wang <wangzhou1@xxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v2 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] crypto: Fix out-of-bounds memory access in generic-gcm-aesni
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH] crypto: n2 - cure use after free
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: n2 - cure use after free
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] crypto: n2 - cure use after free
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2 - cure use after free
- From: Jan Engelhardt <jengelh@xxxxxxx>
- RE: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [Plinth PATCH]{topost} crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [Plinth PATCH]{topost} crypto: Fix race around ctx->rcvused by making it atomic_t
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v2 4/4] crypto: caam - add Derived Key Protocol (DKP) support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 3/4] crypto: caam - save Era in driver's private data
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 2/4] crypto: caam - remove needless ablkcipher key copy
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 1/4] crypto: caam - constify key data
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - limit mask and type
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Li Kun <hw.likun@xxxxxxxxxx>
- [PATCH] crypto: x86/twofish-3way - Fix %rbp usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: RFC: Crypto: Race in updating available writable socket memory.
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RFC: Crypto: Race in updating available writable socket memory.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH RESEND] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: af_alg - add keylen checking to avoid NULL ptr passing down
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in __list_del_entry_valid (2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- KASAN: use-after-free Read in __list_del_entry_valid (2)
- From: syzbot <bot+29cf0a34886ca39d13fc0451b174140973b5bed3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in __crypto_alg_lookup
- From: syzbot <bot+08fafbe591c1d2980114c828ef2d7b5a46c19bff@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 3/6] crypto: tcrypt: allow setting num of bufs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/6] crypto: tcrypt: add multi buf ahash jiffies test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/6] crypto: tcrypt: add multibuf skcipher speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/6] crypto: tcrypt: fix AEAD decryption speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/6] crypto: tcrypt: use multi buf for ahash mb test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/6] crypto: tcrypt: fix and add multi buf speed tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 33/45] arch/arm: remove duplicate includes
- From: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
- [PATCH v2] hwrng: Clean up RNG list when last hwrng is unregistered
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: general protection fault in ___cache_free
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- [PATCH 00/17] crypto: inside-secure - various improvements
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 15/17] crypto: inside-secure - retry to proceed the request later on fail
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 16/17] crypto: inside-secure - EIP97 support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/17] crypto: inside-secure - EBUSY is not an error on async request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/17] crypto: inside-secure - remove unused parameter in invalidate_cache
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/17] crypto: inside-secure - fix typo in a comment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/17] crypto: inside-secure - move cipher crypto mode to request context
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 09/17] crypto: inside-secure - move request dequeueing into a workqueue
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/17] crypto: inside-secure - refrain from unneeded invalidations
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 12/17] crypto: inside-secure - increase the ring size
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 13/17] crypto: inside-secure - acknowledge the result requests all at once
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/17] crypto: inside-secure - use threaded IRQs for result handling
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 14/17] crypto: inside-secure - handle more result requests when counter is full
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 11/17] crypto: inside-secure - dequeue all requests at once
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 17/17] Documentation/bindings: crypto: document the SafeXcel EIP97 compatible
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/17] crypto: inside-secure - remove useless memset
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/17] crypto: inside-secure - comment the caching function
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/17] crypto: inside-secure - remove extra empty line
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] staging: ccree: staging: ccree: replace sysfs by debugfs interface
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/10] staging: ccree: remove useless debug code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/10] staging: ccree: remove CC_IRQ_DELAY dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/10] staging: ccree: add explicit module init/exit func
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/10] staging: ccree: clean up PM registration
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/10] staging: ccree: drop ifdef CONFIG_OF in code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/10] staging: ccree: remove ssi_config.h
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/10] staging: ccree: fix fips event irq handling build
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/10] staging: ccree: update TODO
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/10] staging: ccree: turn compile time debug log to params
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/10] staging: ccree: cleanups & fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Encrypt selftest fails with qat_c3xxx
- From: Georg Sauthoff <mail@xxxxxxxx>
- [PATCH crypto] crypto: aesni - add wrapper for generic gcm(aes)
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH crypto] crypto: aesni - fix typo in generic_gcmaes_decrypt
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: exynos - Support Exynos5250+ SoCs
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] hwrng: Clean up RNG list when last hwrng is unregisterd
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/2] crypto: seqiv - Remove unused alg/spawn variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH 1/2] crypto: echainiv - Remove unused alg/spawn variable
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH v4] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: INFO: task hung in lock_sock_nested
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: INFO: task hung in aead_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 2/4] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 1/4] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 0/4] Assorted changes for Exynos PRNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 02/24] staging: ccree: fix hash naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/24] staging: ccree: amend hash func def for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/24] staging: ccree: fix func def and decl coding style
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/24] staging: ccree: simplify expression with local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/24] staging: ccree: fix req mgr func def coding style
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/24] staging: ccree: fix cipher naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/24] staging: ccree: fix ivgen naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 15/24] staging: ccree: fix ivgen func def coding style
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 16/24] staging: ccree: drop unsupported MULTI2 mode code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 17/24] staging: ccree: remove SSI_CC_HAS_ macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 20/24] staging: ccree: rename vars/structs/enums from ssi_ to cc_
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 22/24] staging: ccree: fix sram mgr naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 23/24] staging: ccree: simplify freeing SRAM memory address
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 24/24] staging: ccree: fix FIPS mgr naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 21/24] staging: ccree: fix buf mgr naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 19/24] staging: ccree: rename all DX to CC
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 18/24] staging: ccree: rename all SSI to CC
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/24] staging: ccree: fix cipher func def coding style
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/24] staging: ccree: remove cipher sync blkcipher remains
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/24] staging: ccree: fix reg mgr naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/24] staging: ccree: fix func call param indentation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/24] staging: ccree: shorten parameter name
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/24] staging: ccree: func params should follow func name
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/24] staging: ccree: remove ahash wrappers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/24] staging: ccree: cleanups and simplification
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: AF_ALG: skb limits
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v4] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [RFC crypto v2 9/9] Makefile Kconfig
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 8/9] chtls: Register the ULP
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 7/9] chtls: Inline crypto request Tx/Rx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 6/9] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 5/9] chtls: Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 4/9] chcr: Key Macro
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 3/9] cxgb4: LLD driver changes to enable TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 2/9] cxgb4: Inline TLS FW Interface
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 1/9] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [RFC crypto v2 0/9] Chelsio Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2] crypto: artpec6: set correct iv size for gcm(aes)
- From: Lars Persson <lars.persson@xxxxxxxx>
- Re: [PATCH] crypto: artpec6: set correct iv size for gcm(aes)
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: artpec6: set correct iv size for gcm(aes)
- From: Lars Persson <lars.persson@xxxxxxxx>
- Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - limit mask and type
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - limit mask and type
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: AF_ALG - limit mask and type
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: gf128mul - remove incorrect comment
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: chacha20poly1305 - validate the digest size
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in blkcipher_walk_done
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Write in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in strcmp
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto: exynos - Support Exynos5250+ SoCs
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] crypto: stm32: fix modular build
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- [PATCH v2 4/4] crypto: exynos - Introduce mutex to prevent concurrent access to hardware
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 3/4] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 2/4] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 1/4] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 0/4] Assorted changes for Exynos PRNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH] crypto: qat - reduce stack size with KASAN
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - fix race accessing cipher request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Add myself as co-maintainer for s5p-sss.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: stm32: fix modular build
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: stm32: fix module device table name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] chcr: ensure cntrl is initialized to fix bit-wise or'ing of garabage data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] chcr: remove unused variables net_device, pi, adap and cntrl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: make arrays sgl_ent_len and dsgl_ent_len static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mcryptd: protect the per-CPU queue with a lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cryptd: make cryptd_max_cpu_qlen module parameter static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - set walk.iv for zero-length inputs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - use correct print specifier for size_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs Use PTR_ERR_OR_ZERO()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix typo in KPP dependency of CRYPTO_ECDH
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: inside-secure - set of fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] crypto: inside-secure - do not use areq->result for partial results
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/4] crypto: inside-secure - fix request allocations in invalidation path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/4] crypto: inside-secure - free requests even if their handling failed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: inside-secure - per request invalidation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] crypto: talitos - fixes and performance improvement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] crypto: inside-secure - set of fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] crypto: inside-secure - free requests even if their handling failed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: inside-secure - fix request allocations in invalidation path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] crypto: inside-secure - set of fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] crypto: inside-secure - per request invalidation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- KASAN: wild-memory-access Write in scatterwalk_copychunks
- From: syzbot <bot+afbe81311aa0da046f1e62a665eccddac254f803@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] KEYS: reject NULL restriction string when type is specified
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] crypto: talitos - fixes and performance improvement
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] KEYS: reject NULL restriction string when type is specified
- From: David Howells <dhowells@xxxxxxxxxx>
- AF_ALG: skb limits
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC PATCH] crypto: chacha20 - add implementation using 96-bit nonce
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - fix race accessing cipher request
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] crypto: AF_ALG - fix race accessing cipher request
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
- From: Ying Xue <ying.xue@xxxxxxxxxxxxx>
- [PATCH] fscrypt: add support for ChaCha20 contents encryption
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- RE: [PATCH 8/8] net: tipc: remove unused hardirq.h
- From: Jon Maloy <jon.maloy@xxxxxxxxxxxx>
- Re: [ovs-dev] [PATCH 7/8] net: ovs: remove unused hardirq.h
- From: Pravin Shelar <pshelar@xxxxxxx>
- Re: [PATCH 4/8] vfs: remove unused hardirq.h
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] net: tipc: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/8] net: ovs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] net: caif: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] vfs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH] crypto: null - Get rid of crypto_{get,put}_default_null_skcipher2()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: api - Unexport crypto_larval_lookup()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [crypto 4/8] chtls: CPL handler definition
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH v9 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Jyri Sarha <jsarha@xxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [crypto 6/8] chtls: TCB and Key program
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [crypto 6/8] chtls: TCB and Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
- From: Dave Martin <Dave.Martin@xxxxxxx>
- RE: [crypto 4/8] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [crypto 6/8] chtls: TCB and Key program
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [crypto 6/8] chtls: TCB and Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] Fix NULL pointer deref. on no default_rng
- From: Pierre <pinaraf@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] staging: ccree: ssi_aead: fixed all coding style warnings.
- From: SUNIL KALLUR RAMEGOWDA <kallur.sunil@xxxxxxxxx>
- Re: [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- [PATCH v3 20/20] DO NOT MERGE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 19/20] crypto: arm64/crct10dif-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 18/20] crypto: arm64/crc32-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 17/20] crypto: arm64/aes-ghash - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 16/20] crypto: arm64/aes-bs - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 15/20] crypto: arm64/aes-blk - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 14/20] crypto: arm64/aes-ccm - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 13/20] crypto: arm64/sha2-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 12/20] crypto: arm64/sha1-ce - yield NEON after every block of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 11/20] arm64: assembler: add macros to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 10/20] arm64: assembler: add utility macros to push/pop stack frames
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 08/20] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 09/20] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 06/20] crypto: arm64/aes-blk - remove configurable interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 07/20] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 05/20] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 04/20] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 03/20] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 02/20] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 01/20] crypto: testmgr - add a new test case for CRC-T10DIF
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 00/20] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- locking in prng
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Dave P Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH RFC 4/4] crypto: stm32: convert to the new crypto engine API
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] lib/mpi: Fix umul_ppmm() for MIPS64r6
- From: James Hogan <james.hogan@xxxxxxxx>
- [PATCH v9 2/8] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 8/8] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 3/8] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 4/8] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 7/8] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 6/8] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 5/8] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 1/8] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v9 0/8] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: exynos - Icrease the priority of the driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH] crypto: exynos - Icrease the priority of the driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: exynos - Icrease the priority of the driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [crypto 4/8] chtls: CPL handler definition
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.9-stable] Revert "crypto: caam - get rid of tasklet"
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH 4.9-stable] Revert "crypto: caam - get rid of tasklet"
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [crypto 4/8] chtls: CPL handler definition
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Announce loop-AES-v3.7m file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [RFC] crypto: exynos - Icrease the priority of the driver
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [crypto 6/8] chtls: TCB and Key program
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC] crypto: exynos - Icrease the priority of the driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 3/3] crypto: exynos - Reseed PRNG after generating 2^16 random bytes
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 2/3] crypto: exynos - Improve performance of PRNG
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 0/3] Assorted changes for Exynos PRNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 1/3] crypto: exynos - Support Exynos5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [crypto 8/8] Kconfig Makefile
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 7/8] chtls: structure and macro definiton
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 4/8] chtls: CPL handler definition
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 6/8] chtls: TCB and Key program
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 5/8] chtls: Inline crypto request for Tx.
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 3/8] chtls: ulp for Inline TLS processing
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 2/8] chcr: changes to chcr driver
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 1/8] cxgb4: Inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto 0/8] Chelsio inline TLS
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto] chcr: fix a type cast error
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH] crypto: chcr: select CRYPTO_GF128MUL
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 02/45] drivers: crypto: remove duplicate includes
- From: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
- [Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 10/38] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v9 11/38] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: Eduardo Valentin <eduval@xxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- KASAN: use-after-free Write in aead_recvmsg
- From: syzbot <bot+3cbaad7926415bb8cfce88469e5f66a2bbd0d0cd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 19/19] DO NOT MERGE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 18/19] crypto: arm64/crct10dif-ce - yield NEON every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 17/19] crypto: arm64/crc32-ce - yield NEON every 16 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/19] crypto: arm64/aes-ghash - yield after processing fixed number of blocks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/19] crypto: arm64/aes-bs - yield after processing each 128 bytes of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/19] crypto: arm64/aes-blk - yield after processing a fixed chunk of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/19] crypto: arm64/sha2-ce - yield every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/19] crypto: arm64/sha1-ce - yield every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/19] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/19] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/19] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/19] crypto: arm64/aes-blk - remove configurable interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/19] crypto: arm64/ghash - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/19] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/19] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/19] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/19] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/19] crypto: testmgr - add a new test case for CRC-T10DIF
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/19] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [bug report] chcr: Add support for Inline IPSec
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 00/10] staging: ccree: cleanups & fixes
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH] treewide: remove duplicate includes
- From: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2
- From: syzbot <bot+5ac9d43b97a33f321ed58e24960e30defaef843f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 03/10] staging: ccree: remove more unnecessary parentheses
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/10] staging: ccree: fix indentation of var assignment
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/10] staging: ccree: remove interim DT docs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/10] staging: ccree: remove braces for single statement blocks
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/10] staging: ccree: NULLify backup_info when unused
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/10] staging: ccree: amend aead func def for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/10] staging: ccree: fix AEAD func naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/10] staging: ccree: update TODO list
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/10] staging: ccree: remove unproven likely/unlikely
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/10] staging: ccree: cleanups & fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: arm64/ghash - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Write in sha3_update
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- general protection fault in af_alg_free_areq_sgls
- From: syzbot <bot+ff72ab869817b6ea60bc570f638ee030f4fc73e5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: Add myself as co-maintainer for s5p-sss.c
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: reject NULL restriction string when type is specified
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: reject NULL restriction string when type is specified
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5 06/27] x86: crypto, annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 08/27] x86: assembly, annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH] chcr: ensure cntrl is initialized to fix bit-wise or'ing of garabage data
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] chcr: remove unused variables net_device, pi, adap and cntrl
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: mcryptd: protect the per-CPU queue with a lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: chelsio: make arrays sgl_ent_len and dsgl_ent_len static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: cryptd: make cryptd_max_cpu_qlen module parameter static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32: fix module device table name
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- [PATCH] crypto: stm32: fix module device table name
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/6] crypto: tcrypt: use multi buf for ahash mb test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: tcrypt: fix AEAD decryption speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: tcrypt: add multi buf ahash jiffies test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: tcrypt: allow setting num of bufs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: tcrypt: add multibuf skcipher speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: tcrypt: fix and add multi buf speed tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (2)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in blkcipher_walk_virt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]