Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] treewide: remove duplicate includes
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- KASAN: use-after-free Write in aead_recvmsg
- From: syzbot <bot+3cbaad7926415bb8cfce88469e5f66a2bbd0d0cd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v3 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v3 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 19/19] DO NOT MERGE
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 18/19] crypto: arm64/crct10dif-ce - yield NEON every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 17/19] crypto: arm64/crc32-ce - yield NEON every 16 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 16/19] crypto: arm64/aes-ghash - yield after processing fixed number of blocks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 15/19] crypto: arm64/aes-bs - yield after processing each 128 bytes of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 14/19] crypto: arm64/aes-blk - yield after processing a fixed chunk of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 13/19] crypto: arm64/sha2-ce - yield every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 12/19] crypto: arm64/sha1-ce - yield every 8 blocks of input
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 11/19] arm64: assembler: add macro to conditionally yield the NEON under PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 10/19] crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/19] crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/19] crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/19] crypto: arm64/aes-blk - remove configurable interleave
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/19] crypto: arm64/ghash - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/19] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/19] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/19] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/19] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/19] crypto: testmgr - add a new test case for CRC-T10DIF
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/19] crypto: arm64 - play nice with CONFIG_PREEMPT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [bug report] chcr: Add support for Inline IPSec
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 00/10] staging: ccree: cleanups & fixes
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] treewide: remove duplicate includes
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH] treewide: remove duplicate includes
- From: Pravin Shedge <pravin.shedge4linux@xxxxxxxxx>
- BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2
- From: syzbot <bot+5ac9d43b97a33f321ed58e24960e30defaef843f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel paging request in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 03/10] staging: ccree: remove more unnecessary parentheses
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/10] staging: ccree: fix indentation of var assignment
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/10] staging: ccree: remove interim DT docs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/10] staging: ccree: remove braces for single statement blocks
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/10] staging: ccree: NULLify backup_info when unused
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/10] staging: ccree: amend aead func def for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/10] staging: ccree: fix AEAD func naming convention
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/10] staging: ccree: update TODO list
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/10] staging: ccree: remove unproven likely/unlikely
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/10] staging: ccree: remove inline qualifiers
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/10] staging: ccree: cleanups & fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: arm64/ghash - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] crypto: arm64 - disable NEON across scatterwalk API calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Write in sha3_update
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- general protection fault in af_alg_free_areq_sgls
- From: syzbot <bot+ff72ab869817b6ea60bc570f638ee030f4fc73e5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: Add myself as co-maintainer for s5p-sss.c
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: reject NULL restriction string when type is specified
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: reject NULL restriction string when type is specified
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5 06/27] x86: crypto, annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 08/27] x86: assembly, annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 26/27] x86_32: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v5 23/27] x86_64: assembly, change all ENTRY+ENDPROC to SYM_FUNC_*
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH] chcr: ensure cntrl is initialized to fix bit-wise or'ing of garabage data
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] chcr: remove unused variables net_device, pi, adap and cntrl
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: mcryptd: protect the per-CPU queue with a lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: chelsio: make arrays sgl_ent_len and dsgl_ent_len static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: cryptd: make cryptd_max_cpu_qlen module parameter static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32: fix module device table name
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- [PATCH] crypto: stm32: fix module device table name
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/6] crypto: tcrypt: use multi buf for ahash mb test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: tcrypt: fix AEAD decryption speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: tcrypt: add multi buf ahash jiffies test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: tcrypt: allow setting num of bufs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: tcrypt: add multibuf skcipher speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt: add multibuf aead speed test
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: tcrypt: fix and add multi buf speed tests
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING: kernel stack regs has bad 'bp' value (2)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in blkcipher_walk_virt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in kfree
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: BUG: unable to handle kernel NULL pointer dereference in kfree
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: general protection fault in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: skcipher - set walk.iv for zero-length inputs
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Read in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in crypto_chacha20_crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH RFC 3/4] crypto: virtio: convert to new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH RFC 2/4] crypto: omap: convert to new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH RFC 4/4] crypto: stm32: convert to the new crypto engine API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: replace FSF address with web source in license notices
- From: Philippe Ombredanne <pombredanne@xxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ARM64: crypto: do not call crypto_unregister_skcipher twice on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: chacha20 - Alignment fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] cryptd: Add cryptd_max_cpu_qlen module parameter
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHi v2] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [5/8] crypto: remove unused hardirq.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: fix memory leak on info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto v3 1/2] cxgb4: Add support for Inline IPSec Tx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto v3 2/2] chcr: Add support for Inline IPSec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: tcrypt - set assoc in sg_init_aead()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: replace FSF address with web source in license notices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix NULL pointer deref. on no default_rng
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio - Fix an error code in chcr_hash_dma_map()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss - Remove a stray tab
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chelsio: remove redundant assignments to reqctx and dst_size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] STM32 CRYP crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: salsa20 - fix blkcipher_walk API usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hmac - require that the underlying hash algorithm is unkeyed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: kernel BUG at ./include/linux/mm.h:LINE! (2)
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: suspicious RCU usage at ./include/linux/mm.h:LINE
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: suspicious RCU usage at ./include/trace/events/kmem.h:LINE
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: salsa20 - fix blkcipher_walk API usage
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2] crypto: hmac - require that the underlying hash algorithm is unkeyed
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Write in sha3_update
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 2/8] fs: pstore: remove unused hardirq.h
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: general protection fault in scatterwalk_copychunks
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in crypto_remove_spawns
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha3_update
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: general protection fault in scatterwalk_copychunks
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Write in sha3_update
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: stack-out-of-bounds Write in sha3_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: slab-out-of-bounds Write in sha3_final
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2] X.509: fix comparisons of ->pkey_algo
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] X.509: fix printing uninitialized stack memory when OID is empty
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- WARNING: kernel stack regs has bad 'bp' value (2)
- From: syzbot <bot+e01a53d277c86c4e61e7c84ec83432ed395c7df8@xxxxxxxxxxxxxxxxxxxxxxxxx>
- general protection fault in scatterwalk_copychunks
- From: syzbot <bot+bad1be57103f3cca1808f4a5231ab02d20f69fa3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - use correct print specifier for size_t
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 1/4] crypto: inside-secure - per request invalidation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: inside-secure - free requests even if their handling failed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: inside-secure - set of fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: inside-secure - fix request allocations in invalidation path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- KASAN: use-after-free Read in crypto_chacha20_crypt
- From: syzbot <bot+257f413f0ea433750ffaa72b2748289380957904@xxxxxxxxxxxxxxxxxxxxxxxxx>
- general protection fault in crypto_chacha20_crypt
- From: syzbot <bot+fa2ed481fed0c7ace1571b88a89dfd49ffd89cb6@xxxxxxxxxxxxxxxxxxxxxxxxx>
- suspicious RCU usage at ./include/trace/events/kmem.h:LINE
- From: syzbot <bot+fbbeacd3de00d98d2fe5a9e69d8025f36dbd2ddb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: slab-out-of-bounds Write in sha3_final
- From: syzbot <bot+264771bd693024ccca21958c9ccaacfc20852fe8@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: stack-out-of-bounds Write in sha3_final
- From: syzbot <bot+21d2e751cbf850bffdba93a41b744ee510bb7613@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: stack-out-of-bounds Write in sha3_update
- From: syzbot <bot+6f724d52da8e3ff8872545bd8444f50f0d174c5f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] staging: most: Remove a attribute group from a kobject
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: fix printing uninitialized stack memory when OID is empty
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] X.509: fix comparisons of ->pkey_algo
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: Add myself as co-maintainer for s5p-sss.c
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH 1/4] crypto: inside-secure - per request invalidation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/4] crypto: inside-secure - set of fixes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: inside-secure - fix request allocations in invalidation path
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: inside-secure - per request invalidation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: inside-secure - free requests even if their handling failed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: general protection fault in blkcipher_walk_done
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: general protection fault in af_alg_free_areq_sgls
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in blkcipher_walk_done
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: general protection fault in blkcipher_walk_done
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: general protection fault in blkcipher_walk_done
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: arm/aes-neonbs Use PTR_ERR_OR_ZERO()
- From: Vasyl Gomonovych <gomonovych@xxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: KASAN: use-after-free Read in aead_recvmsg
- From: Stephan Müller <smueller@xxxxxxxxxx>
- general protection fault in crypto_remove_spawns
- From: syzbot <bot+b6e703f648ebbbf57a4528d4314e0c2a5c893dc2@xxxxxxxxxxxxxxxxxxxxxxxxx>
- general protection fault in blkcipher_walk_done
- From: syzbot <bot+3401d9494b9380f7244bcc7fec49680878fccba6@xxxxxxxxxxxxxxxxxxxxxxxxx>
- KASAN: use-after-free Read in aead_recvmsg
- From: syzbot <bot+6fbc13c3b1ed2105e7a2e516be43d6a0624a59c0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v2 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH v2 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH] pkcs7: fix check for self-signed certificate
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] pkcs7: return correct error code if pkcs7_check_authattrs() fails
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] X.509: fix buffer overflow detection in sprint_oid()
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] X.509: fix comparisons of ->pkey_algo
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] X.509: reject invalid BIT STRING for subjectPublicKey
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] ASN.1: check for error from ASN1_OP_END__ACT actions
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH] X.509: use crypto_shash_digest()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] KEYS: be careful with error codes in public_key_verify_signature()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] pkcs7: use crypto_shash_digest()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] pkcs7: fix check for self-signed certificate
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] pkcs7: return correct error code if pkcs7_check_authattrs() fails
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] X.509: fix printing uninitialized stack memory when OID is empty
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] X.509: fix buffer overflow detection in sprint_oid()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] X.509: fix comparisons of ->pkey_algo
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] X.509: reject invalid BIT STRING for subjectPublicKey
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] ASN.1: check for error from ASN1_OP_END__ACT actions
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] ASN.1: fix out-of-bounds read when parsing indefinite length item
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: fix typo in KPP dependency of CRYPTO_ECDH
- From: Hauke Mehrtens <hauke@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: Add driver for JZ4780 PRNG
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH 1/4] staging: ccree: Remove a attribute group from a kobject
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH 2/4] staging: lustre: ldlm: Remove a attribute group from a kobject
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH 3/4] staging: lustre: obdclass: Remove a attribute group from a kobject
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH 4/4] staging: most: Remove a attribute group from a kobject
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH 0/4] Remove a attribute group from a kobject
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Question about ahash export and import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Question about ahash export and import
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH v2] ARM64: crypto: do not call crypto_unregister_skcipher twice on error
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
- From: LABBE Corentin <clabbe@xxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- Re: [PATCH 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: "Andrew F. Davis" <afd@xxxxxx>
- [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
- From: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
- [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - add Derived Key Protocol (DKP) support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] crypto: x86/chacha20 - Remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 3/5] crypto: chacha20 - Remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/5] crypto: chacha20 - Use unaligned access macros when loading key and IV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/5] crypto: chacha20 - Fix unaligned access when loading constants
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: chacha20 - Use unaligned access macros when loading key and IV
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/5] crypto: chacha20 - Fix unaligned access when loading constants
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/5] crypto: chacha20 - Remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/5] crypto: x86/chacha20 - Remove cra_alignmask
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/5] crypto: chacha20 - Alignment fixes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Mark Rutland <mark.rutland@xxxxxxx>
- loop-AES-v3.7l fails to compile with kernel 4.14.1
- From: Helmut Jarausch <jarausch@xxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Alex Matveev <alxmtvv@xxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
- From: Corentin Labbe <clabbe@xxxxxxxxxxxx>
- [PATCH net-next] cryptd: Add cryptd_max_cpu_qlen module parameter
- From: Jon Maxwell <jmaxwell37@xxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: x509 parsing bug + fuzzing crypto in the userspace
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5/8] crypto: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- x509 parsing bug + fuzzing crypto in the userspace
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 3/8] fs: btrfs: remove unused hardirq.h
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] Fix NULL pointer deref. on no default_rng
- From: Pierre <pinaraf@xxxxxxxxxxxx>
- [PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH 2/2] ARM: bcm283x: Add missing interrupt for RNG block
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH 0/2] ARM: bcm283x: Add missing interrupt for RNG block
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH 1/2] dt-binding: rng: Add interrupt property for BCM2835
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 7/8] net: ovs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 3/8] fs: btrfs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 5/8] crypto: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 7/8] net: ovs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 4/8] vfs: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 6/8] net: caif: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 8/8] net: tipc: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 2/8] fs: pstore: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- [PATCH 1/8] mm: kmemleak: remove unused hardirq.h
- From: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
- Re: [PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] staging: ccree: fix incorrect indentation of break statement
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Casey Leedom <leedom@xxxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [crypto v3 2/2] chcr: Add support for Inline IPSec
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [crypto v3 1/2] cxgb4: Add support for Inline IPSec Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- [PATCHi v2] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: cavium: fix memory leak on info
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - set assoc in sg_init_aead()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 00/24] staging: ccree: more cleanup patches
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Gabriel Paubert <paubert@xxxxxxx>
- Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: tcrypt - set assoc in sg_init_aead()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [1/2] crypto/nx: Use percpu send window for NX requests
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 00/24] staging: ccree: more cleanup patches
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 00/24] staging: ccree: more cleanup patches
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 07/24] staging: ccree: remove unneeded cast
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: replace FSF address with web source in license notices
- From: Martin Kepplinger <martink@xxxxxxxxx>
- Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 00/24] staging: ccree: more cleanup patches
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 07/24] staging: ccree: remove unneeded cast
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH 01/24] staging: ccree: fix typos
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/24] staging: ccree: alloc by instance not type
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/24] staging: ccree: remove unnecessary parentheses
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/24] staging: ccree: remove MIN/MAX macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/24] staging: ccree: move logical cont. to 1st line
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/24] staging: ccree: remove unneeded empty lines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/24] staging: ccree: remove unneeded cast
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/24] staging: ccree: make mem barrier per request
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/24] staging: ccree: document spinlock usage
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/24] staging: ccree: constify help string
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/24] staging: ccree: fix code indent
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/24] staging: ccree: Replace CONFIG_PM_RUNTIME with CONFIG_PM
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 15/24] staging: ccree: trim long lines for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 16/24] staging: ccree: remove dead defs and decls
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 17/24] staging: ccree: refactor code with local vars
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 18/24] staging: ccree: rename func for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 19/24] staging: ccree: rename long define for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 20/24] staging: ccree: remove unneeded wrapper function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 21/24] staging: ccree: remove unused field
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 23/24] staging: ccree: use local vars for readability
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 22/24] staging: ccree: replace msleep with a completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 24/24] staging: ccree: drop unused macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/24] staging: ccree: replace macro with inline func
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/24] staging: ccree: replace open coded loop with for
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/24] staging: ccree: more cleanup patches
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Radu Andrei Alexe <radu.alexe@xxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Crypto Update for 4.15
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] Fix NULL pointer deref. on no default_rng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] Fix NULL pointer deref. on no default_rng
- From: Pierre Ducroquet <pinaraf@xxxxxxxxxxxx>
- Re: PATCH : Fix NULL pointer dereference on no default_rng
- From: Pierre <pinaraf@xxxxxxxxxxxx>
- Re: PATCH : Fix NULL pointer dereference on no default_rng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- PATCH : Fix NULL pointer dereference on no default_rng
- From: Pierre <pinaraf@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH 2/2] crypto: caam - add Derived Key Protocol (DKP) support
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - save Era in driver's private data
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3] crypto: AF_ALG - remove locking in async callback
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] crypto: stm32/hash - Fix return issue on update
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: dh - input validation fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: algif_aead - skip SGL entries with NULL page
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - skip SGL entries with NULL page
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: s5p-sss - Remove a stray tab
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Radu Andrei Alexe <radu.alexe@xxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: algif_aead - skip SGL entries with NULL page
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: s5p-sss - Remove a stray tab
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: chelsio - Fix an error code in chcr_hash_dma_map()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 00/10] staging: ccree: fixes and cleanups
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Radu Andrei Alexe <radu.alexe@xxxxxxx>
- [PATCH v2 2/2] chcr: Add support for Inline IPSec
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH v2 1/2] cxgb4: Add support for Inline IPSec Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- Re: [PATCH] staging: ccree: remove unused pointer cc_base
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 01/10] staging: ccree: fix leak of import() after init()
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 03/10] staging: ccree: simplify AEAD using local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 02/10] staging: ccree: make long func call sites readable
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 05/10] staging: ccree: fold common code into function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 06/10] staging: ccree: simplify pm manager using local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 04/10] staging: ccree: simplify buf mgr using local vars
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 09/10] staging: ccree: remove braces for single statement
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 08/10] staging: ccree: remove compare to none zero
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 10/10] staging: ccree: remove unused cc_base parameter
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 07/10] staging: ccree: remove unneeded cast
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 00/10] staging: ccree: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: chelsio: remove redundant assignments to reqctx and dst_size
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] staging: ccree: remove unused pointer cc_base
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/8] staging: ccree: use more readable func names
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: general protection fault in asn1_ber_decoder
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v2 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH v2 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH v2 05/12] hwrng: bcm2835-rng: Use device managed helpers
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH v2 02/12] hwrng: bcm2835-rng: Define a driver private context
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
- From: Radu Andrei Alexe <radu.alexe@xxxxxxx>
- Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [bug report] crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 02/12] hwrng: bcm2835-rng: Define a driver private context
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 01/12] hwrng: bcm2835-rng: Obtain base register via resource
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 04/12] hwrng: bcm2835-rng: Implementation cleanup callback
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 05/12] hwrng: bcm2835-rng: Use device managed helpers
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 09/12] hwrng: bcm2835-rng: Add Broadcom MIPS I/O accessors
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 03/12] hwrng: bcm2835-rng: Move enabling to hwrng::init
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH v2 00/12] bcm63xx-rng conversion to bcm2835-rng
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [Part2 PATCH v8 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v8 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v8 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: general protection fault in asn1_ber_decoder
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/8] staging: ccree: remove compare to none zero
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 5/8] staging: ccree: fold common code into function
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 3/8] staging: ccree: simplify AEAD using local var
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/8] staging: ccree: use more readable func names
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 1/8] staging: ccree: fix leak of import() after init()
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/8] staging: ccree: use more readable func names
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/8] staging: ccree: simplify AEAD using local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/8] staging: ccree: fold common code into function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/8] staging: ccree: simplify buf mgr using local vars
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 6/8] staging: ccree: simplify pm manager using local var
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 7/8] staging: ccree: remove compare to none zero
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 8/8] staging: ccree: remove braces for single statement
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/8] staging: ccree: fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - remove locking in async callback
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 1/1] crypto: stm32/hash - Fix return issue on update
- From: <lionel.debieve@xxxxxx>
- Re: general protection fault in asn1_ber_decoder
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: general protection fault in asn1_ber_decoder
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: rng: Document BCM7278 RNG200 compatible
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: general protection fault in asn1_ber_decoder
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- general protection fault in asn1_ber_decoder
- From: syzbot <bot+04b92812698232d15d78c1e4d3bbf6fcc21eeeb1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [Part2 PATCH v8 10/38] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 11/38] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v8 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] crypto: dh - Remove pointless checks for NULL 'p' and 'g'
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] crypto: dh - Don't permit 'key' or 'g' size longer than 'p'
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: dh - Fix double free of ctx->p
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [PATCH 1/1] crypto: stm32/hash - Fix return issue in update
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- Re: [PATCH 0/3] More code cleanups
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] More code cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] More code cleanups
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chcr - Replace _manual_ swap with swap macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Add a NULL entry at the end of mv_cesa_plat_id_table[]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 2/3] crypto: atmel-aes/tdes - remove empty functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecdh - remove empty exit()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update maintainer for qat
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - remove unused param of ctx_map_to_sec4_sg()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - remove unneeded edesc zeroization
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] staging: ccree: simplify registers access
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/3] staging: ccree: simplify ioread/iowrite
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/3] staging: ccree: simplify error handling logic
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] More code cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Crypto Fixes for 4.14
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] crypto: dh - Don't permit 'key' or 'g' size longer than 'p'
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 2/5] crypto: dh - Don't permit 'p' to be 0
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 5/5] crypto: dh - Remove pointless checks for NULL 'p' and 'g'
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 4/5] crypto: qat - Clean up error handling in qat_dh_set_secret()
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 1/5] crypto: dh - Fix double free of ctx->p
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 0/5] crypto: dh - input validation fixes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [Part2 PATCH v7 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] crypto: chcr - Replace _manual_ swap with swap macro
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- Re: [cryptodev:master 125/166] FATAL: drivers/crypto/marvell/marvell-cesa: struct platform_device_id is not terminated with a NULL entry!
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell - Add a NULL entry at the end of mv_cesa_plat_id_table[]
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [cryptodev:master 125/166] FATAL: drivers/crypto/marvell/marvell-cesa: struct platform_device_id is not terminated with a NULL entry!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Fwd: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: Jim Quigley <jim.quigley@xxxxxxxxxx>
- Re: [PATCH] crypto: qat: qat_common: qat_uclo - mark expected switch fall-throughs
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: marvell - Remove the old CESA driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: clean up clang warning on unread variable offset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat: remove unused and redundant pointer vf_info
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat: qat_common: qat_uclo - mark expected switch fall-throughs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update caam crypto driver maintainers list
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto: Convert timers to use timer_setup()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Fixes for the Atmel AES crypto module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: atmel-aes/tdes/sha - return appropriate error code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam/qi - abort algorithm setup on DPAA2 parts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 00/20] simplify crypto wait for async op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix incorrect define
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: atmel-aes/tdes/sha - remove useless irq init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Use skcipher for ctr fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Switch cipher algs to the skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: remove unused variable qim
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: tcrypt - fix buffer lengths in test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: mark expected switch fall-throughs in do_test()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto:chelsio: Remove unused parameter
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccm - preserve the IV buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86/crypto/sha256-mb: fix panic due to unaligned access
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [Part2 PATCH v7 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
- From: Jim Quigley <Jim.Quigley@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH 3/4] crypto: qat - fix double free of ctx->p
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/4] crypto: dh - fix double free of ctx->p
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [v3 PATCH 2/3] crypto: atmel-aes/tdes - remove empty functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: ecdh - remove empty exit()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccm - preserve the IV buffer
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]