Linux Crypto
Thread Index
[
Prev Page
][
Next Page
]
Re: BUG: unable to handle kernel NULL pointer dereference in kfree
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: BUG: unable to handle kernel NULL pointer dereference in kfree
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: AF_ALG - wait for data at beginning of recvmsg
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: general protection fault in crypto_chacha20_crypt
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: skcipher - set walk.iv for zero-length inputs
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: stack-out-of-bounds Read in crypto_chacha20_crypt
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Read in crypto_chacha20_crypt
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RFC 1/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH RFC 3/4] crypto: virtio: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH RFC 2/4] crypto: omap: convert to new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH RFC 4/4] crypto: stm32: convert to the new crypto engine API
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
[PATCH RFC 0/4] crypto: engine - Permit to enqueue all async requests
From
: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: replace FSF address with web source in license notices
From
: Philippe Ombredanne <pombredanne@xxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] ARM64: crypto: do not call crypto_unregister_skcipher twice on error
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] crypto: chacha20 - Alignment fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH net-next] cryptd: Add cryptd_max_cpu_qlen module parameter
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCHi v2] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [5/8] crypto: remove unused hardirq.h
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: fix memory leak on info
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [crypto v3 1/2] cxgb4: Add support for Inline IPSec Tx
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [crypto v3 2/2] chcr: Add support for Inline IPSec
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: crypto: tcrypt - set assoc in sg_init_aead()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: replace FSF address with web source in license notices
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix NULL pointer deref. on no default_rng
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [v2,01/12] hwrng: bcm2835 - Obtain base register via resource
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chelsio - Fix an error code in chcr_hash_dma_map()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: s5p-sss - Remove a stray tab
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chelsio: remove redundant assignments to reqctx and dst_size
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/2] STM32 CRYP crypto driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: salsa20 - fix blkcipher_walk API usage
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: hmac - require that the underlying hash algorithm is unkeyed
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: general protection fault in af_alg_free_areq_sgls
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: kernel BUG at ./include/linux/mm.h:LINE! (2)
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: suspicious RCU usage at ./include/linux/mm.h:LINE
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: suspicious RCU usage at ./include/trace/events/kmem.h:LINE
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: salsa20 - fix blkcipher_walk API usage
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2] crypto: hmac - require that the underlying hash algorithm is unkeyed
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: stack-out-of-bounds Write in sha3_update
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 2/8] fs: pstore: remove unused hardirq.h
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Crypto Fixes for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: general protection fault in scatterwalk_copychunks
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in crypto_remove_spawns
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: KASAN: slab-out-of-bounds Write in sha3_update
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2] crypto: AF_ALG - race-free access of encryption flag
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: general protection fault in scatterwalk_copychunks
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: KASAN: stack-out-of-bounds Write in sha3_update
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: stack-out-of-bounds Write in sha3_final
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: slab-out-of-bounds Write in sha3_final
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2] X.509: fix comparisons of ->pkey_algo
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] X.509: fix printing uninitialized stack memory when OID is empty
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in af_alg_free_areq_sgls
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
WARNING: kernel stack regs has bad 'bp' value (2)
From
: syzbot <bot+e01a53d277c86c4e61e7c84ec83432ed395c7df8@xxxxxxxxxxxxxxxxxxxxxxxxx>
general protection fault in scatterwalk_copychunks
From
: syzbot <bot+bad1be57103f3cca1808f4a5231ab02d20f69fa3@xxxxxxxxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: caam/qi - use correct print specifier for size_t
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2 1/4] crypto: inside-secure - per request invalidation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v2 3/4] crypto: inside-secure - only update the result buffer when provided
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v2 2/4] crypto: inside-secure - free requests even if their handling failed
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v2 0/4] crypto: inside-secure - set of fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH v2 4/4] crypto: inside-secure - fix request allocations in invalidation path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
KASAN: use-after-free Read in crypto_chacha20_crypt
From
: syzbot <bot+257f413f0ea433750ffaa72b2748289380957904@xxxxxxxxxxxxxxxxxxxxxxxxx>
general protection fault in crypto_chacha20_crypt
From
: syzbot <bot+fa2ed481fed0c7ace1571b88a89dfd49ffd89cb6@xxxxxxxxxxxxxxxxxxxxxxxxx>
suspicious RCU usage at ./include/trace/events/kmem.h:LINE
From
: syzbot <bot+fbbeacd3de00d98d2fe5a9e69d8025f36dbd2ddb@xxxxxxxxxxxxxxxxxxxxxxxxx>
KASAN: slab-out-of-bounds Write in sha3_final
From
: syzbot <bot+264771bd693024ccca21958c9ccaacfc20852fe8@xxxxxxxxxxxxxxxxxxxxxxxxx>
KASAN: stack-out-of-bounds Write in sha3_final
From
: syzbot <bot+21d2e751cbf850bffdba93a41b744ee510bb7613@xxxxxxxxxxxxxxxxxxxxxxxxx>
KASAN: stack-out-of-bounds Write in sha3_update
From
: syzbot <bot+6f724d52da8e3ff8872545bd8444f50f0d174c5f@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] staging: most: Remove a attribute group from a kobject
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] X.509: fix printing uninitialized stack memory when OID is empty
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH] X.509: fix comparisons of ->pkey_algo
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH] crypto: Add myself as co-maintainer for s5p-sss.c
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH 1/4] crypto: inside-secure - per request invalidation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: general protection fault in af_alg_free_areq_sgls
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH 0/4] crypto: inside-secure - set of fixes
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 4/4] crypto: inside-secure - fix request allocations in invalidation path
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 3/4] crypto: inside-secure - only update the result buffer when provided
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 1/4] crypto: inside-secure - per request invalidation
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
[PATCH 2/4] crypto: inside-secure - free requests even if their handling failed
From
: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
Re: general protection fault in blkcipher_walk_done
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: general protection fault in af_alg_free_areq_sgls
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in blkcipher_walk_done
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: general protection fault in blkcipher_walk_done
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: general protection fault in blkcipher_walk_done
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: arm/aes-neonbs Use PTR_ERR_OR_ZERO()
From
: Vasyl Gomonovych <gomonovych@xxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: KASAN: use-after-free Read in aead_recvmsg
From
: Stephan Müller <smueller@xxxxxxxxxx>
general protection fault in crypto_remove_spawns
From
: syzbot <bot+b6e703f648ebbbf57a4528d4314e0c2a5c893dc2@xxxxxxxxxxxxxxxxxxxxxxxxx>
general protection fault in blkcipher_walk_done
From
: syzbot <bot+3401d9494b9380f7244bcc7fec49680878fccba6@xxxxxxxxxxxxxxxxxxxxxxxxx>
KASAN: use-after-free Read in aead_recvmsg
From
: syzbot <bot+6fbc13c3b1ed2105e7a2e516be43d6a0624a59c0@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH v2 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
[PATCH v2 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH v2 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH] pkcs7: fix check for self-signed certificate
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] pkcs7: return correct error code if pkcs7_check_authattrs() fails
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] X.509: fix buffer overflow detection in sprint_oid()
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] X.509: fix comparisons of ->pkey_algo
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] X.509: reject invalid BIT STRING for subjectPublicKey
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] ASN.1: check for error from ASN1_OP_END__ACT actions
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH] X.509: use crypto_shash_digest()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] KEYS: be careful with error codes in public_key_verify_signature()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] pkcs7: use crypto_shash_digest()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] pkcs7: fix check for self-signed certificate
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] pkcs7: return correct error code if pkcs7_check_authattrs() fails
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] X.509: fix printing uninitialized stack memory when OID is empty
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] X.509: fix buffer overflow detection in sprint_oid()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] X.509: fix comparisons of ->pkey_algo
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] X.509: reject invalid BIT STRING for subjectPublicKey
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] ASN.1: check for error from ASN1_OP_END__ACT actions
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH] ASN.1: fix out-of-bounds read when parsing indefinite length item
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Rob Herring <robh@xxxxxxxxxx>
[PATCH] crypto: fix typo in KPP dependency of CRYPTO_ECDH
From
: Hauke Mehrtens <hauke@xxxxxxxxxx>
Re: [PATCH v3 0/4] crypto: Add driver for JZ4780 PRNG
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH 1/4] staging: ccree: Remove a attribute group from a kobject
From
: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
[PATCH 2/4] staging: lustre: ldlm: Remove a attribute group from a kobject
From
: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
[PATCH 3/4] staging: lustre: obdclass: Remove a attribute group from a kobject
From
: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
[PATCH 4/4] staging: most: Remove a attribute group from a kobject
From
: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
[PATCH 0/4] Remove a attribute group from a kobject
From
: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Question about ahash export and import
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: Question about ahash export and import
From
: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
From
: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
[PATCH v2] ARM64: crypto: do not call crypto_unregister_skcipher twice on error
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
From
: LABBE Corentin <clabbe@xxxxxxxxxxxx>
Re: [PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
Re: [PATCH 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: "Andrew F. Davis" <afd@xxxxxx>
[PATCH 2/3] hwrng: exynos - add Samsung Exynos True RNG driver
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 1/3] dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 3/3] ARM: dts: exynos: Add nodes for True Random Number Generator
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH 0/3] True RNG driver for Samsung Exynos 5250+ SoCs
From
: Łukasz Stelmach <l.stelmach@xxxxxxxxxxx>
[PATCH] crypto: skcipher - Fix skcipher_walk_aead_common
From
: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH 2/2] crypto: caam - add Derived Key Protocol (DKP) support
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 4/5] crypto: x86/chacha20 - Remove cra_alignmask
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 3/5] crypto: chacha20 - Remove cra_alignmask
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 2/5] crypto: chacha20 - Use unaligned access macros when loading key and IV
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 1/5] crypto: chacha20 - Fix unaligned access when loading constants
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH 2/5] crypto: chacha20 - Use unaligned access macros when loading key and IV
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 1/5] crypto: chacha20 - Fix unaligned access when loading constants
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 3/5] crypto: chacha20 - Remove cra_alignmask
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 5/5] crypto: chacha20 - Fix keystream alignment for chacha20_block()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 4/5] crypto: x86/chacha20 - Remove cra_alignmask
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 0/5] crypto: chacha20 - Alignment fixes
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Mark Rutland <mark.rutland@xxxxxxx>
loop-AES-v3.7l fails to compile with kernel 4.14.1
From
: Helmut Jarausch <jarausch@xxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Alex Matveev <alxmtvv@xxxxxxxxx>
Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
From
: Corentin Labbe <clabbe@xxxxxxxxxxxx>
[PATCH net-next] cryptd: Add cryptd_max_cpu_qlen module parameter
From
: Jon Maxwell <jmaxwell37@xxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
[PATCH] crypto/arm64: aes-ce-cipher - move assembler code to .S file
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: x509 parsing bug + fuzzing crypto in the userspace
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 5/8] crypto: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
x509 parsing bug + fuzzing crypto in the userspace
From
: Alexander Potapenko <glider@xxxxxxxxxx>
Re: [PATCH 3/8] fs: btrfs: remove unused hardirq.h
From
: David Sterba <dsterba@xxxxxxx>
Re: [PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH] Fix NULL pointer deref. on no default_rng
From
: Pierre <pinaraf@xxxxxxxxxxxx>
[PATCH] crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'
From
: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
[PATCH 2/2] ARM: bcm283x: Add missing interrupt for RNG block
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
[PATCH 0/2] ARM: bcm283x: Add missing interrupt for RNG block
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
[PATCH 1/2] dt-binding: rng: Add interrupt property for BCM2835
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 7/8] net: ovs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 3/8] fs: btrfs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 5/8] crypto: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 7/8] net: ovs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 4/8] vfs: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 6/8] net: caif: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 8/8] net: tipc: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 2/8] fs: pstore: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
[PATCH 1/8] mm: kmemleak: remove unused hardirq.h
From
: "Yang Shi" <yang.s@xxxxxxxxxxxxxxx>
Re: [PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH -stable] arm: crypto: reduce priority of bit-sliced AES cipher
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] staging: ccree: fix incorrect indentation of break statement
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Casey Leedom <leedom@xxxxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Alex Williamson <alex.williamson@xxxxxxxxxx>
[crypto v3 2/2] chcr: Add support for Inline IPSec
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[crypto v3 1/2] cxgb4: Add support for Inline IPSec Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Vinod Koul <vinod.koul@xxxxxxxxx>
[PATCHi v2] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Vinod Koul <vinod.koul@xxxxxxxxx>
Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
From
: Vinod Koul <vinod.koul@xxxxxxxxx>
Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
Re: [PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
From
: Stephan Mueller <smueller@xxxxxxxxxx>
[PATCH] crypto: keywrap - Add missing ULL suffixes for 64-bit constants
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
[PATCH] dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: cavium: fix memory leak on info
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH] crypto: tcrypt - set assoc in sg_init_aead()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 00/24] staging: ccree: more cleanup patches
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Gabriel Paubert <paubert@xxxxxxx>
Re: [PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: tcrypt - set assoc in sg_init_aead()
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Colin Ian King <colin.king@xxxxxxxxxxxxx>
[PATCH][V2] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Julia Lawall <julia.lawall@xxxxxxx>
[PATCH] crypto/nx: fix spelling mistake: "availavle" -> "available"
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [1/2] crypto/nx: Use percpu send window for NX requests
From
: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 00/24] staging: ccree: more cleanup patches
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 00/24] staging: ccree: more cleanup patches
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 07/24] staging: ccree: remove unneeded cast
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: replace FSF address with web source in license notices
From
: Martin Kepplinger <martink@xxxxxxxxx>
Re: [PATCH v2 2/2] chcr: Add support for Inline IPSec
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 00/24] staging: ccree: more cleanup patches
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 07/24] staging: ccree: remove unneeded cast
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Kim Phillips <kim.phillips@xxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Kim Phillips <kim.phillips@xxxxxxx>
[PATCH 01/24] staging: ccree: fix typos
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 02/24] staging: ccree: alloc by instance not type
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 03/24] staging: ccree: remove unnecessary parentheses
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 04/24] staging: ccree: remove MIN/MAX macros
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 05/24] staging: ccree: move logical cont. to 1st line
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 06/24] staging: ccree: remove unneeded empty lines
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 07/24] staging: ccree: remove unneeded cast
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 08/24] staging: ccree: make mem barrier per request
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 10/24] staging: ccree: document spinlock usage
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 11/24] staging: ccree: constify help string
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 12/24] staging: ccree: fix code indent
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 13/24] staging: ccree: Replace CONFIG_PM_RUNTIME with CONFIG_PM
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 15/24] staging: ccree: trim long lines for readability
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 16/24] staging: ccree: remove dead defs and decls
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 17/24] staging: ccree: refactor code with local vars
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 18/24] staging: ccree: rename func for readability
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 19/24] staging: ccree: rename long define for readability
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 20/24] staging: ccree: remove unneeded wrapper function
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 21/24] staging: ccree: remove unused field
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 23/24] staging: ccree: use local vars for readability
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 22/24] staging: ccree: replace msleep with a completion
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 24/24] staging: ccree: drop unused macro
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 14/24] staging: ccree: replace macro with inline func
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 09/24] staging: ccree: replace open coded loop with for
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 00/24] staging: ccree: more cleanup patches
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Radu Andrei Alexe <radu.alexe@xxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Horia Geantă <horia.geanta@xxxxxxx>
Crypto Update for 4.15
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] Fix NULL pointer deref. on no default_rng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH] Fix NULL pointer deref. on no default_rng
From
: Pierre Ducroquet <pinaraf@xxxxxxxxxxxx>
Re: PATCH : Fix NULL pointer dereference on no default_rng
From
: Pierre <pinaraf@xxxxxxxxxxxx>
Re: PATCH : Fix NULL pointer dereference on no default_rng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
PATCH : Fix NULL pointer dereference on no default_rng
From
: Pierre <pinaraf@xxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Kim Phillips <kim.phillips@xxxxxxx>
[PATCH 2/2] crypto: caam - add Derived Key Protocol (DKP) support
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 1/2] crypto: caam - save Era in driver's private data
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v3] crypto: AF_ALG - remove locking in async callback
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] crypto: stm32/hash - Fix return issue on update
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/5] crypto: dh - input validation fixes
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v3] crypto: algif_aead - skip SGL entries with NULL page
From
: Stephan Müller <smueller@xxxxxxxxxx>
[PATCH v2] crypto: algif_aead - skip SGL entries with NULL page
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: algif_aead - skip SGL entries with NULL page
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: s5p-sss - Remove a stray tab
From
: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Radu Andrei Alexe <radu.alexe@xxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: algif_aead - skip SGL entries with NULL page
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: s5p-sss - Remove a stray tab
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH] crypto: chelsio - Fix an error code in chcr_hash_dma_map()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Kim Phillips <kim.phillips@xxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH v2 00/10] staging: ccree: fixes and cleanups
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Radu Andrei Alexe <radu.alexe@xxxxxxx>
[PATCH v2 2/2] chcr: Add support for Inline IPSec
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
[PATCH v2 1/2] cxgb4: Add support for Inline IPSec Tx
From
: Atul Gupta <atul.gupta@xxxxxxxxxxx>
Re: [PATCH] staging: ccree: remove unused pointer cc_base
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 01/10] staging: ccree: fix leak of import() after init()
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 03/10] staging: ccree: simplify AEAD using local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 02/10] staging: ccree: make long func call sites readable
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 05/10] staging: ccree: fold common code into function
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 06/10] staging: ccree: simplify pm manager using local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 04/10] staging: ccree: simplify buf mgr using local vars
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 09/10] staging: ccree: remove braces for single statement
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 08/10] staging: ccree: remove compare to none zero
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 10/10] staging: ccree: remove unused cc_base parameter
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 07/10] staging: ccree: remove unneeded cast
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 00/10] staging: ccree: fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH] crypto: chelsio: remove redundant assignments to reqctx and dst_size
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH] staging: ccree: remove unused pointer cc_base
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/8] staging: ccree: use more readable func names
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: general protection fault in asn1_ber_decoder
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH v2 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH v2 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH v2 05/12] hwrng: bcm2835-rng: Use device managed helpers
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH v2 02/12] hwrng: bcm2835-rng: Define a driver private context
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
From
: Radu Andrei Alexe <radu.alexe@xxxxxxx>
Re: [PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
From
: Horia Geantă <horia.geanta@xxxxxxx>
[bug report] crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH v2 02/12] hwrng: bcm2835-rng: Define a driver private context
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 01/12] hwrng: bcm2835-rng: Obtain base register via resource
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 04/12] hwrng: bcm2835-rng: Implementation cleanup callback
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 05/12] hwrng: bcm2835-rng: Use device managed helpers
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 06/12] hwrng: bcm2835-rng: Rework interrupt masking
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 09/12] hwrng: bcm2835-rng: Add Broadcom MIPS I/O accessors
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 03/12] hwrng: bcm2835-rng: Move enabling to hwrng::init
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH v2 00/12] bcm63xx-rng conversion to bcm2835-rng
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
[PATCH v2] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [Part2 PATCH v8 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [Part2 PATCH v8 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [Part2 PATCH v8 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Gary R Hook <gary.hook@xxxxxxx>
Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
From
: Fabien DESSENNE <fabien.dessenne@xxxxxx>
Re: general protection fault in asn1_ber_decoder
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 7/8] staging: ccree: remove compare to none zero
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 6/8] staging: ccree: simplify pm manager using local var
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 5/8] staging: ccree: fold common code into function
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 3/8] staging: ccree: simplify AEAD using local var
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 2/8] staging: ccree: use more readable func names
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH 1/8] staging: ccree: fix leak of import() after init()
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/8] staging: ccree: use more readable func names
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 3/8] staging: ccree: simplify AEAD using local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 5/8] staging: ccree: fold common code into function
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 4/8] staging: ccree: simplify buf mgr using local vars
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 6/8] staging: ccree: simplify pm manager using local var
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 7/8] staging: ccree: remove compare to none zero
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 8/8] staging: ccree: remove braces for single statement
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 0/8] staging: ccree: fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2] crypto: AF_ALG - remove locking in async callback
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] lib/mpi: call cond_resched() from mpi_powm() loop
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH v2 1/1] crypto: stm32/hash - Fix return issue on update
From
: <lionel.debieve@xxxxxx>
Re: general protection fault in asn1_ber_decoder
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: general protection fault in asn1_ber_decoder
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 1/2] dt-bindings: rng: Document BCM7278 RNG200 compatible
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
From
: "Tobin C. Harding" <me@xxxxxxxx>
Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
From
: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
Re: general protection fault in asn1_ber_decoder
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
general protection fault in asn1_ber_decoder
From
: syzbot <bot+04b92812698232d15d78c1e4d3bbf6fcc21eeeb1@xxxxxxxxxxxxxxxxxxxxxxxxx>
[Part2 PATCH v8 10/38] crypto: ccp: Define SEV userspace ioctl and command id
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 11/38] crypto: ccp: Define SEV key management command id
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v8 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v2 5/5] crypto: dh - Remove pointless checks for NULL 'p' and 'g'
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH v2 3/5] crypto: dh - Don't permit 'key' or 'g' size longer than 'p'
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH v2 1/5] crypto: dh - Fix double free of ctx->p
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 3/3] staging: ccree: simplify ioread/iowrite
From
: "Tobin C. Harding" <me@xxxxxxxx>
[PATCH 1/1] crypto: stm32/hash - Fix return issue in update
From
: Lionel Debieve <lionel.debieve@xxxxxx>
Re: [PATCH 0/3] More code cleanups
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/3] More code cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 0/3] More code cleanups
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: chcr - Replace _manual_ swap with swap macro
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: marvell - Add a NULL entry at the end of mv_cesa_plat_id_table[]
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [v3 PATCH 2/3] crypto: atmel-aes/tdes - remove empty functions
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ecdh - remove empty exit()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update maintainer for qat
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: caam - remove unused param of ctx_map_to_sec4_sg()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] crypto: caam - remove unneeded edesc zeroization
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH 2/3] staging: ccree: simplify registers access
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 3/3] staging: ccree: simplify ioread/iowrite
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 1/3] staging: ccree: simplify error handling logic
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 0/3] More code cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Crypto Fixes for 4.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 3/5] crypto: dh - Don't permit 'key' or 'g' size longer than 'p'
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 2/5] crypto: dh - Don't permit 'p' to be 0
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 5/5] crypto: dh - Remove pointless checks for NULL 'p' and 'g'
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 4/5] crypto: qat - Clean up error handling in qat_dh_set_secret()
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 1/5] crypto: dh - Fix double free of ctx->p
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH v2 0/5] crypto: dh - input validation fixes
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Andrew Lunn <andrew@xxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Andrew Lunn <andrew@xxxxxxx>
Re: [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [Part2 PATCH v7 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
From
: Eric Anholt <eric@xxxxxxxxxx>
Re: [Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Borislav Petkov <bp@xxxxxxxxx>
[PATCH] crypto: chcr - Replace _manual_ swap with swap macro
From
: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
Re: [cryptodev:master 125/166] FATAL: drivers/crypto/marvell/marvell-cesa: struct platform_device_id is not terminated with a NULL entry!
From
: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
[PATCH] crypto: marvell - Add a NULL entry at the end of mv_cesa_plat_id_table[]
From
: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
[cryptodev:master 125/166] FATAL: drivers/crypto/marvell/marvell-cesa: struct platform_device_id is not terminated with a NULL entry!
From
: kbuild test robot <fengguang.wu@xxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Fwd: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: Jim Quigley <jim.quigley@xxxxxxxxxx>
Re: [PATCH] crypto: qat: qat_common: qat_uclo - mark expected switch fall-throughs
From
: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
Re: [PATCH 0/3] crypto: marvell - Remove the old CESA driver
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: cavium: clean up clang warning on unread variable offset
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: qat: remove unused and redundant pointer vf_info
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: qat: qat_common: qat_uclo - mark expected switch fall-throughs
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update caam crypto driver maintainers list
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] drivers/crypto: Convert timers to use timer_setup()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Fixes for the Atmel AES crypto module
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 0/2] crypto: s5p-sss: Add HASH support for Exynos
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] crypto: atmel-aes/tdes/sha - return appropriate error code
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: caam/qi - abort algorithm setup on DPAA2 parts
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v10 00/20] simplify crypto wait for async op
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: caam - fix incorrect define
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/3] crypto: atmel-aes/tdes/sha - remove useless irq init
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: vmx - Use skcipher for ctr fallback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: marvell - Switch cipher algs to the skcipher interface
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccp: remove unused variable qim
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] crypto: tcrypt - fix buffer lengths in test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: tcrypt: mark expected switch fall-throughs in do_test()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/7] crypto:chelsio: Remove unused parameter
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: ccm - preserve the IV buffer
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] x86/crypto/sha256-mb: fix panic due to unaligned access
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [Part2 PATCH v7 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
virtio:rng: Virtio RNG devices need to be re-registered after suspend/resume
From
: Jim Quigley <Jim.Quigley@xxxxxxxxxx>
Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [Part2 PATCH v6 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
From
: Scott Branden <scott.branden@xxxxxxxxxxxx>
Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
From
: Stefan Wahren <stefan.wahren@xxxxxxxx>
Re: [PATCH 3/4] crypto: qat - fix double free of ctx->p
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [PATCH 1/4] crypto: dh - fix double free of ctx->p
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
Re: [Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Borislav Petkov <bp@xxxxxxxxx>
[v3 PATCH 2/3] crypto: atmel-aes/tdes - remove empty functions
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[PATCH] crypto: ecdh - remove empty exit()
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH] crypto: ccm - preserve the IV buffer
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH 1/4] crypto: dh - fix double free of ctx->p
From
: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH] MAINTAINERS: update maintainer for qat
From
: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
[PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 2/3] staging: ccree: handle limiting of DMA masks
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 3/3] staging: ccree: remove dead code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH v2 0/3] staging: ccree: Fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: invalid opcode: 0000 [#1] SMP [aesni_intel]
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 02/12] hwrng: bcm2835-rng: Define a driver private context
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 05/12] hwrng: bcm2835-rng: Use device managed helpers
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 03/12] hwrng: bcm2835-rng: Move enabling to hwrng::init
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 01/12] hwrng: bcm2835-rng: Obtain base register via resource
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 04/12] hwrng: bcm2835-rng: Implementation cleanup callback
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 06/12] hwrng: bcm2835-rng: Rework interrupt masking
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 09/12] hwrng: bcm2835-rng: Add Broadcom MIPS I/O accessors
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 1/2] dt-bindings: rng: Document BCM7278 RNG200 compatible
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 2/2] hwrng: iproc-rng200: Add support for BCM7278
From
: Florian Fainelli <f.fainelli@xxxxxxxxx>
[PATCH 1/4] crypto: dh - fix double free of ctx->p
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 4/4] crypto: dh - don't permit 'key' or 'g' size longer than 'p'
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 2/4] crypto: dh - don't permit 'p' to be 0
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 3/4] crypto: qat - fix double free of ctx->p
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[PATCH 0/4] crypto: dh - input validation fixes
From
: Eric Biggers <ebiggers3@xxxxxxxxx>
[Part2 PATCH v7 00/38] x86: Secure Encrypted Virtualization (AMD)
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 11/38] crypto: ccp: Define SEV key management command id
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v7 10/38] crypto: ccp: Define SEV userspace ioctl and command id
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
From
: Bart Van Assche <Bart.VanAssche@xxxxxxx>
Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
From
: Bart Van Assche <Bart.VanAssche@xxxxxxx>
Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
From
: Hannes Reinecke <hare@xxxxxxx>
Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 1/3] staging: ccree: copy IV to DMAable memory
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH 2/2] crypto: caam - remove unused param of ctx_map_to_sec4_sg()
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH 1/2] crypto: caam - remove unneeded edesc zeroization
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH 1/2] crypto: atmel-aes - properly set IV after {en,de}crypt
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
[PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
[PATCH 0/2] Fixes for the Atmel AES crypto module
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
[PATCH] crypto: ccm - preserve the IV buffer
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
Re: [PATCH v5 17/18] ima: Implement support for module-style appended signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
From
: Vinod Koul <vinod.koul@xxxxxxxxx>
[PATCH 1/3] staging: ccree: copy IV to DMAable memory
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 2/3] staging: ccree: handle limiting of DMA masks
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 3/3] staging: ccree: remove dead code
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
[PATCH 0/3] staging: ccree: Fixes and cleanups
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] crypto: testmgr: don't allocate IV on stack
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: don't allocate IV on stack
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] crypto: testmgr: don't allocate IV on stack
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] crypto: testmgr: don't allocate IV on stack
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH] crypto: testmgr: don't allocate IV on stack
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
From
: Brian King <brking@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
From
: Bart Van Assche <Bart.VanAssche@xxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [PATCH] crypto: AF_ALG - remove locking in async callback
From
: Romain Izard <romain.izard.pro@xxxxxxxxx>
Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Kim Phillips <kim.phillips@xxxxxxx>
[PATCH RESEND 4/4] dma: caam: add dma memcpy driver
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND 3/4] crypto: caam: add functionality used by the caam_dma driver
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND 2/4] arm64: dts: ls1012a: add caam-dma node
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
From
: Horia Geantă <horia.geanta@xxxxxxx>
[PATCH RESEND 0/4] add CAAM DMA memcpy driver
From
: Horia Geantă <horia.geanta@xxxxxxx>
Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
[PATCH] staging: ccree: fix 64 bit scatter/gather DMA ops
From
: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
From
: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] add CAAM DMA memcpy driver
From
: Vinod Koul <vinod.koul@xxxxxxxxx>
Re: [PATCH] hw_random: core: Remove unnecessary new line in MODULE_PARM_DESC
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH] hw_random: Include device.h instead of declaring struct device
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
From
: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
Crypto Fixes for 4.14
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] hw_random: core: Remove unnecessary new line in MODULE_PARM_DESC
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] hw_random: Include device.h instead of declaring struct device
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Part2 PATCH v6.2 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v6.1 15/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v6.1 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[PATCH] crypto: AF_ALG - remove locking in async callback
From
: Stephan Müller <smueller@xxxxxxxxxx>
Re: [PATCH net-next 2/2] chcr: Add support for Inline IPSec
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH net-next 2/2] chcr: Add support for Inline IPSec
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH net-next 1/2] cxgb4: Add support for Inline IPSec Tx
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Borislav Petkov <bp@xxxxxxxxx>
Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
From
: Brijesh Singh <brijesh.singh@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]