Linux Crypto
[Prev Page][Next Page]
- [PATCH] MAINTAINERS: update maintainer for qat
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v2 1/3] staging: ccree: copy IV to DMAable memory
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/3] staging: ccree: handle limiting of DMA masks
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/3] staging: ccree: remove dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/3] staging: ccree: Fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: invalid opcode: 0000 [#1] SMP [aesni_intel]
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 02/12] hwrng: bcm2835-rng: Define a driver private context
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 00/12] bcm63xx-rng conversion to bcm2835-rng
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 05/12] hwrng: bcm2835-rng: Use device managed helpers
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 03/12] hwrng: bcm2835-rng: Move enabling to hwrng::init
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 01/12] hwrng: bcm2835-rng: Obtain base register via resource
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 04/12] hwrng: bcm2835-rng: Implementation cleanup callback
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 07/12] hwrng: bcm2835-rng: Manage an optional clock
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 06/12] hwrng: bcm2835-rng: Rework interrupt masking
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 09/12] hwrng: bcm2835-rng: Add Broadcom MIPS I/O accessors
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 11/12] hwrng: bcm2835-rng: Enable BCM2835 RNG to work on BCM63xx platforms
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 10/12] dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 12/12] hwrng: bcm63xx-rng: Remove since bcm2835-rng takes over
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 08/12] hwrng: bcm2835-rng: Abstract I/O accessors
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: rng: Document BCM7278 RNG200 compatible
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 0/2] hwrng: iproc-rng200: Add support for BCM7278
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 2/2] hwrng: iproc-rng200: Add support for BCM7278
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/4] crypto: dh - fix double free of ctx->p
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/4] crypto: dh - don't permit 'key' or 'g' size longer than 'p'
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/4] crypto: dh - don't permit 'p' to be 0
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/4] crypto: qat - fix double free of ctx->p
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/4] crypto: dh - input validation fixes
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [Part2 PATCH v7 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 11/38] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v7 10/38] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Bart Van Assche <Bart.VanAssche@xxxxxxx>
- Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Bart Van Assche <Bart.VanAssche@xxxxxxx>
- Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/3] staging: ccree: handle limiting of DMA masks
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/3] staging: ccree: copy IV to DMAable memory
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 2/2] crypto: caam - remove unused param of ctx_map_to_sec4_sg()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - remove unneeded edesc zeroization
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 1/2] crypto: atmel-aes - properly set IV after {en,de}crypt
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- [PATCH 2/2] crypto: atmel-aes - Reset the controller before each use
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- [PATCH 0/2] Fixes for the Atmel AES crypto module
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- [PATCH] crypto: ccm - preserve the IV buffer
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH v5 17/18] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- [PATCH 1/3] staging: ccree: copy IV to DMAable memory
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/3] staging: ccree: handle limiting of DMA masks
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/3] staging: ccree: remove dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/3] staging: ccree: Fixes and cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: testmgr: don't allocate IV on stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: don't allocate IV on stack
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: testmgr: don't allocate IV on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: don't allocate IV on stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: don't allocate IV on stack
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Brian King <brking@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Bart Van Assche <Bart.VanAssche@xxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH RESEND 4/4] dma: caam: add dma memcpy driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND 3/4] crypto: caam: add functionality used by the caam_dma driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND 2/4] arm64: dts: ls1012a: add caam-dma node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND 1/4] crypto: caam: add caam-dma node to SEC4.0 device tree binding
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH RESEND 0/4] add CAAM DMA memcpy driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] staging: ccree: fix 64 bit scatter/gather DMA ops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] add CAAM DMA memcpy driver
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH] hw_random: core: Remove unnecessary new line in MODULE_PARM_DESC
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hw_random: Include device.h instead of declaring struct device
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.14
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: core: Remove unnecessary new line in MODULE_PARM_DESC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: Include device.h instead of declaring struct device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Part2 PATCH v6.2 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 15/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 16/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] crypto: AF_ALG - remove locking in async callback
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH net-next 2/2] chcr: Add support for Inline IPSec
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH net-next 2/2] chcr: Add support for Inline IPSec
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH net-next 1/2] cxgb4: Add support for Inline IPSec Tx
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH net-next 2/2] chcr: Add support for Inline IPSec
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH net-next 1/2] cxgb4: Add support for Inline IPSec Tx
- From: Atul Gupta <atul.gupta@xxxxxxxxxxx>
- [PATCH] hw_random: core: Reset user selected rng by writing "" to rng_current
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2] staging: ccree: Fix indentation in ssi_buffer_mgr.c
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix indentation in ssi_buffer_mgr.c
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix indentation in ssi_buffer_mgr.c
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 0/4] add CAAM DMA memcpy driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- RE: [PATCH 0/4] add CAAM DMA memcpy driver
- From: "Koul, Vinod" <vinod.koul@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 0/4] add CAAM DMA memcpy driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] staging: ccree: Fix indentation in ssi_buffer_mgr.c
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- [PATCH] staging: ccree: Fix indentation in ssi_buffer_mgr.c
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v5 00/18] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/4] Rearrange functions to remove forward declarations
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Rearrange functions to remove forward declarations
- From: David Daney <ddaney@xxxxxxxxxxxxxxxxxx>
- [PATCH] hw_random: core: Remove unnecessary new line in MODULE_PARM_DESC
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 4/4] hw_random: core: Remove forward declaration of hwrng_init
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH 3/4] hw_random: core: Rearranging start_khwrngd to remove forward declaration
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH 2/4] hw_random: core: Rearranging rng_get_data to remove forward declaration
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH 0/4] Rearrange functions to remove forward declarations
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH 1/4] hw_random: core: Remove forward declaration by rearranging code
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] drivers/crypto: Convert timers to use timer_setup()
- From: Lars Persson <lars.persson@xxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto: Convert timers to use timer_setup()
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] hw_random: Include device.h instead of declaring struct device
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [v2 PATCH 2/3] crypto: atmel-aes/tdes - remove empty functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: "BUG: scheduling while atomic" in atmel-aes on Linux v4.14-rc6
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v8 0/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v8 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/2] crypto: s5p-sss: Change spaces to tabs
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- "BUG: scheduling while atomic" in atmel-aes on Linux v4.14-rc6
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] drivers/crypto: Convert timers to use timer_setup()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: s5p-sss: change spaces into tabs in defines
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6.1 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6.1 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6.1 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6.1 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: [Part2 PATCH v6 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6 11/38] crypto: ccp: Define SEV key management command id
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6 10/38] crypto: ccp: Define SEV userspace ioctl and command id
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Part2 PATCH v6 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: s5p-sss: change spaces into tabs in defines
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: caam/qi - abort algorithm setup on DPAA2 parts
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - fix incorrect define
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [Part2 PATCH v6.1 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6.1 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- invalid opcode: 0000 [#1] SMP [aesni_intel]
- From: SviMik <svimik@xxxxxxxxx>
- [PATCH 3/3] crypto: atmel-aes/tdes/sha - remove useless irq init
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/3] crypto: atmel-aes/tdes - remove empty function
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: atmel-aes/tdes/sha - return appropriate error code
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v6 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto/s5p-sss: Use common error handling code in s5p_aes_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/s5p-sss: Use common error handling code in s5p_aes_probe()
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] crypto/s5p-sss: Use common error handling code in s5p_aes_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto-ccp: Use common error handling code in sp_get_irqs()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: s5p-sss: change spaces into tabs in defines
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: crypto-testmgr: Use common error handling code in drbg_cavs_test()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto/drbg: account for no longer returning -EALREADY
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto-testmgr: Use common error handling code in drbg_cavs_test()
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto-testmgr: Delete an unnecessary variable initialisation in drbg_cavs_test()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto-testmgr: Use common error handling code in drbg_cavs_test()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto-testmgr: Fine-tuning for drbg_cavs_test()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto-ansi_cprng: Delete unnecessary blank lines
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto-ansi_cprng: Delete two variable assignments in get_prng_bytes()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto-ansi_cprng: Use common error handling code in get_prng_bytes()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto-ansi_cprng: Fine-tuning for three function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- [Part2 PATCH v6 00/38] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 10/38] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 11/38] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 16/38] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 17/38] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 18/38] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v6 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/2] random: always call random ready function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/2] random: always call random ready function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] random: always call random ready function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/2] crypto/drbg: account for no longer returning -EALREADY
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] random: always call random ready function
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH v5 0/2] STM32 CRYP crypto driver
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH v5 1/2] dt-bindings: Document STM32 CRYP bindings
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- Re: [PATCH v4 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Neil Armstrong <narmstrong@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH v4 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v7 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v7 1/2] crypto: s5p-sss: change spaces into tabs in defines
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH v4 1/2] dt-bindings: Document STM32 CRYP bindings
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH v4 0/2] STM32 CRYP crypto driver
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- Re: [PATCH v3] staging: ccree: fix boolreturn.cocci warning
- From: Suniel Mahesh <sunil.m@xxxxxxxxxxxx>
- Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Brian King <brking@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] staging: ccree: fix boolreturn.cocci warning
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Kernel panic when using ccm(aes) with the Atmel AES HW accelerator
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- [PATCH v10 01/20] crypto: change transient busy return code to -ENOSPC
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 02/20] crypto: ccp: use -ENOSPC for transient busy indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 06/20] crypto: introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 07/20] crypto: move algif to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 08/20] crypto: move pub key to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 09/20] crypto: move drbg to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 10/20] crypto: move gcm to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 12/20] fscrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 13/20] dm: move dm-verity to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 14/20] cifs: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 15/20] ima: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 16/20] crypto: tcrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 17/20] crypto: talitos: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 18/20] crypto: qce: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 19/20] crypto: mediatek: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 20/20] crypto: adapt api sample to use async. op wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 04/20] crypto: remove redundant backlog checks on EBUSY
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 11/20] crypto: move testmgr to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 03/20] net: use -ENOSPC for transient busy indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v10 00/20] simplify crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3] staging: ccree: fix boolreturn.cocci warning
- From: sunil.m@xxxxxxxxxxxx
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2] staging: ccree: fix boolreturn.cocci warning
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v2] staging: ccree: Fix bool comparison
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [PATCH v2] staging: ccree: fix boolreturn.cocci warning
- From: sunil.m@xxxxxxxxxxxx
- [PATCH v2] staging: ccree: Fix bool comparison
- From: sunil.m@xxxxxxxxxxxx
- [PATCH v5 02/18] ima: Remove some superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 01/18] ima: Remove redundant conditional operator
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/18] evm, ima: Remove more superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/18] ima: Simplify ima_eventsig_init
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/18] ima: Improvements in ima_appraise_measurement
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 08/18] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 10/18] ima: Store measurement after appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 11/18] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 14/18] integrity: Introduce integrity_keyring_from_id
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 16/18] ima: Add functions to read and verify a modsig signature
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 15/18] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 17/18] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 09/18] ima: Don't pass xattr value to EVM xattr verification.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 07/18] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/18] evm, ima: Remove superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 00/18] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp: remove unused variable qim
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/crypto/sha256-mb: fix panic due to unaligned access
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] target: Use sgl_alloc_order() and sgl_free()
- From: Bart Van Assche <Bart.VanAssche@xxxxxxx>
- Re: [PATCH v2 7/8] scsi/pmcraid: Remove an unused structure member
- From: Bart Van Assche <Bart.VanAssche@xxxxxxx>
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: vmx ghash buggy on ppc64le
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: New Linux accelerators discussion list [was: Re: Fostering linux community collaboration on hardware accelerators]
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: New Linux accelerators discussion list [was: Re: Fostering linux community collaboration on hardware accelerators]
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v7 2/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/2] crypto: s5p-sss: change spaces into tabs in defines
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 17/20] crypto: talitos: move to generic async completion
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH 2/2] Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add HASH support for Exynos
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 1/2] change spaces into tabs in defines
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2 1/8] lib/scatterlist: Introduce sgl_alloc() and sgl_free()
- From: Johannes Thumshirn <jthumshirn@xxxxxxx>
- Re: md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v2 8/8] scsi/pmcraid: Use sgl_alloc_order() and sgl_free_order()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 7/8] scsi/pmcraid: Remove an unused structure member
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 5/8] target: Use sgl_alloc_order() and sgl_free()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 4/8] nvmet/rdma: Use sgl_alloc() and sgl_free()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 3/8] nvmet/fc: Use sgl_alloc() and sgl_free()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [PATCH v2 1/8] lib/scatterlist: Introduce sgl_alloc() and sgl_free()
- From: Hannes Reinecke <hare@xxxxxxx>
- New Linux accelerators discussion list [was: Re: Fostering linux community collaboration on hardware accelerators]
- From: Andrew Donnellan <andrew.donnellan@xxxxxxxxxxx>
- [PATCH] hwrng/xgene-rng: Convert timers to use timer_setup()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: vmx ghash buggy on ppc64le
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: vmx - Use skcipher for ctr fallback
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/8] nvmet/fc: Use sgl_alloc() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 2/8] crypto: scompress - use sgl_alloc() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 7/8] scsi/pmcraid: Remove an unused structure member
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 8/8] scsi/pmcraid: Use sgl_alloc_order() and sgl_free_order()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 6/8] scsi/ipr: Use sgl_alloc_order() and sgl_free_order()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 5/8] target: Use sgl_alloc_order() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 4/8] nvmet/rdma: Use sgl_alloc() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 1/8] lib/scatterlist: Introduce sgl_alloc() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- [PATCH v2 0/8] Introduce sgl_alloc() and sgl_free()
- From: Bart Van Assche <bart.vanassche@xxxxxxx>
- Re: [PATCH] staging: ccree: fix boolreturn.cocci warning
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH] staging: ccree: Fix bool comparison
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] change spaces into tabs in defines
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] x86/crypto/sha1-mb: fix panic due to unaligned access
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- [PATCH 1/2] x86/crypto/sha256-mb: fix panic due to unaligned access
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH] staging: ccree: fix boolreturn.cocci warning
- From: sunil.m@xxxxxxxxxxxx
- [PATCH] staging: ccree: Fix bool comparison
- From: sunil.m@xxxxxxxxxxxx
- md5sum (from libkcapi) fails on kernel 4.9 but not on 4.13
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH v9 00/20] simplify crypto wait for async op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 01/20] crypto: change transient busy return code to -EAGAIN
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 02/20] crypto: ccp: use -EAGAIN for transient busy indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 03/20] net: use -EAGAIN for transient busy indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 04/20] crypto: remove redundant backlog checks on EBUSY
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 06/20] crypto: introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 08/20] crypto: move pub key to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 09/20] crypto: move drbg to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 10/20] crypto: move gcm to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 11/20] crypto: move testmgr to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 14/20] cifs: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 15/20] ima: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 16/20] crypto: tcrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 17/20] crypto: talitos: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 18/20] crypto: qce: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 19/20] crypto: mediatek: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 20/20] crypto: adapt api sample to use async. op wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 13/20] dm: move dm-verity to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 12/20] fscrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 07/20] crypto: move algif to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 05/20] crypto: marvell/cesa: remove redundant backlog checks on EBUSY
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v9 00/20] simplify crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.8/31] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.9/31] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.8/31] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Switch cipher algs to the skcipher interface
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell - Switch cipher algs to the skcipher interface
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update caam crypto driver maintainers list
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] crypto: qat: qat_common: qat_uclo - mark expected switch fall-throughs
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.5/31] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.6/31] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.5/31] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.6/31] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.5/31] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.6/31] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.5/31] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Nouveau] [PATCH 03/10] driver:gpu: return -ENOMEM on allocation failure.
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v3 0/4] crypto: Add driver for JZ4780 PRNG
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Douglas Miller <dougmill@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat: remove unused and redundant pointer vf_info
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp: remove unused variable qim
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: cavium: clean up clang warning on unread variable offset
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Francois Ozog <francois.ozog@xxxxxxxxxx>
- Re: [PATCH 00/18] crypto: talitos - fixes and performance improvement
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/13] crypto: crypto4xx: wire up hmac_mc to hmac_muting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: keywrap - simplify code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: dh_helper - return unsigned value for crypto_dh_key_len()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: dh_helper - return unsigned int for dh_data_size()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecdh_helper - return unsigned value for crypto_ecdh_key_len()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] chacha20-ssse3/avx2: satisfy stack validation 2.0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: lrw - Fixes for the 'create()' function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: pr_err() strings should end with newlines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: Add driver for JZ4780 PRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: marvell - Remove the old CESA driver
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.2 12.1/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.3/31] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Douglas Miller <dougmill@xxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.2 12.1/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH] staging/ccree: Declare compiled out functions static inline
- From: Rishabh Hardas <rishabhhardas@xxxxxxxxx>
- Re: [PATCH v5] crypto: s5p-sss: Add HASH support for Exynos
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- Crypto Fixes for 4.14
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto API - async semantics
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: crypto API - async semantics
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto API - async semantics
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: crypto API - async semantics
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Andrew Donnellan <andrew.donnellan@xxxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- [Part2 PATCH v5.2 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.2 12.3/31] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [Part2 PATCH v5.2 12.2/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.2 12.1/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: Fostering linux community collaboration on hardware accelerators
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.3/31] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 0/3] crypto: marvell - Remove the old CESA driver
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: marvell - Remove the old CESA driver
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: marvell - Remove the old mv_cesa driver
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: marvell - Add a platform_device_id table
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] ARM: configs: Stop selecting the old CESA driver
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- crypto API - async semantics
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] crypto: atmel-aes - properly set IV after {en,de}crypt
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - properly set IV after {en,de}crypt
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - properly set IV after {en,de}crypt
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Fostering linux community collaboration on hardware accelerators
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] chacha20-ssse3/avx2: satisfy stack validation 2.0
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/2] crypto: tcrypt - fix buffer lengths in test_aead_speed()
- From: Robert Baronescu <robert.baronescu@xxxxxxx>
- [PATCH 1/2] crypto: tcrypt - fix S/G table for test_aead_speed()
- From: Robert Baronescu <robert.baronescu@xxxxxxx>
- Re: [PATCH 1/2] crypto: lrw - Fix an error handling path in 'create()'
- From: walter harms <wharms@xxxxxx>
- Re: [PATCH 1/2] crypto: lrw - Fix an error handling path in 'create()'
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] staging: ccree: Fix lines longer than 80 characters
- From: Stephen Brennan <stephen@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: lrw - Fix an error handling path in 'create()'
- From: walter harms <wharms@xxxxxx>
- [PATCH] crypto: tcrypt: mark expected switch fall-throughs in do_test()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: s5p-sss: Add HASH support for Exynos
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v2] crypto: shash - Fix zero-length shash ahash digest crash
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: shash - Fix zero-length shash ahash digest crash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] chacha20-ssse3/avx2: satisfy stack validation 2.0
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.2/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5 11/31] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] chacha20-ssse3/avx2: satisfy stack validation 2.0
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH] crypto: make the seed() function optional
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 2/2] crypto: lrw - Check for incorrect cipher name
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH 1/2] crypto: lrw - Fix an error handling path in 'create()'
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH 0/2] crypto: lrw - Fixes for the 'create()' function
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH v2 2/7] crypto:chelsio: Check error code with IS_ERR macro
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 4/7] crypto:chelsio:Use x8_ble gf multiplication to calculate IV.
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 5/7] crypto:chelsio:Remove allocation of sg list to implement 2K limit of dsgl header
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 7/7] crypto:chelsio: Fix memory leak
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 6/7] crypto:chelsio:Move DMA un/mapping to chcr from lld cxgb4 driver
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 3/7] crypto:gf128mul: The x8_ble multiplication functions
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 1/7] crypto:chelsio: Remove unused parameter
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [ANNOUNCE] libkcapi v1.0.0 released
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v5 12/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5.1 12.2/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: bcm: use of_device_get_match_data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap: use of_device_get_match_data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32: use of_device_get_match_data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algboss: remove redundant setting of len to zero
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] drivers:crypto: return -ENOMEM on allocation failure.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: stm32 - Try to fix hash padding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: stm32 - Fix uninitialized data usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] padata cpu awareness fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crc32-pclmul: remove useless relative addressing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto:ccp - invoke the DMA callback in a standard way
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - unmap pages and remove unmap objects in callback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - Fix an error handling path in 'create()'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: make the seed() function optional
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 01/20] crypto: change transient busy return code to -EAGAIN
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: skcipher - noop for enc/dec with NULL data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: shash - no kmap of zero SG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Part2 PATCH v5.1 12.1/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.8/31] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.5/31] crypto: ccp: Implement SEV_PEK_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.4/31] crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.3/31] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.6/31] crypto: ccp: Implement SEV_PDH_GEN ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.9/31] crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 12.2/31] crypto: ccp: Define SEV userspace ioctl and command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5.1 10/31] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5 12/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5 12/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v4] crypto: s5p-sss: Add HASH support for Exynos
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
- [PATCH] crypto: atmel-aes - properly set IV after {en,de}crypt
- From: Romain Izard <romain.izard.pro@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH 00/18] crypto: talitos - fixes and performance improvement
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 01/18] crypto: talitos - fix AEAD test failures
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 04/18] crypto: talitos - fix AEAD for sha224 on non sha224 capable chips
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 02/18] crypto: talitos - fix memory corruption on SEC2
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 03/18] crypto: talitos - fix setkey to check key weakness
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 05/18] crypto: talitos - fix use of sg_link_tbl_len
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 07/18] crypto: talitos - zeroize the descriptor with memset()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 06/18] crypto: talitos - fix ctr-aes-talitos
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 08/18] crypto: talitos - declare local functions static
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 10/18] crypto: talitos - use of_property_read_u32()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 12/18] crypto: talitos - don't check the number of channels at each interrupt
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 09/18] crypto: talitos - use devm_kmalloc()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 14/18] crypto: talitos - simplify tests in ipsec_esp()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 13/18] crypto: talitos - remove to_talitos_ptr_len()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 15/18] crypto: talitos - DMA map key in setkey()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 16/18] crypto: talitos - do hw_context DMA mapping outside the requests
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 18/18] crypto: talitos - avoid useless copy
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 17/18] crypto: talitos - chain in buffered data for ahash on SEC1
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 11/18] crypto: talitos - use devm_ioremap()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/3] crypto: engine - permit to enqueue aead_request
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [PATCH] staging: ccree: local variable "dev" not required
- From: Suniel Mahesh <sunil.m@xxxxxxxxxxxx>
- Re: [PATCH 0/8] KEYS: keyctl operations for asymmetric keys [ver #2]
- From: George Wilson <ltcgcw@xxxxxxxxxx>
- Re: [Part2 PATCH v5 11/31] crypto: ccp: Define SEV key management command id
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] staging: ccree: local variable "dev" not required
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] crypto:gf128mul: The x8_ble multiplication functions
- From: Harsh Jain <Harsh@xxxxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5 10/31] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 5/6] crypto: talitos - use kzalloc instead of kmalloc
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [PATCH] staging: ccree: local variable "dev" not required
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: engine - permit to enqueue aead_request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Part2 PATCH v5 09/31] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [Part2 PATCH v5 09/31] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH] staging: ccree: local variable "dev" not required
- From: sunil.m@xxxxxxxxxxxx
- [PATCH v4] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: s5p-sss: Add HASH support for Exynos
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Ralf Baechle <ralf@xxxxxxxxxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Part2 PATCH v5 10/31] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5 12/31] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5 11/31] crypto: ccp: Define SEV key management command id
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5 09/31] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [Part2 PATCH v5 00/31] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [PATCH] KEYS: Fix the wrong index when checking the existence of second id
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH v2 2/2] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: P J P <ppandit@xxxxxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: P J P <ppandit@xxxxxxxxxx>
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [Part2 Patch v4.2] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH] KEYS: checking the input id parameters before finding asymmetric key
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 2/2] MIPS: crypto: Add crc32 and crc32c hw accelerated module
- From: Marcin Nowakowski <marcin.nowakowski@xxxxxxxxxx>
- [PATCH v3] staging: ccree: Convert to platform_{get,set}_drvdata()
- From: sunil.m@xxxxxxxxxxxx
- Re: [Part2 PATCH v4.1 07/29] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
- From: P J P <ppandit@xxxxxxxxxx>
- Re: [Part2 Patch v4.2] crypto: ccp: Add Platform Security Processor (PSP) device support
- From: P J P <ppandit@xxxxxxxxxx>
- [RFC 12/13] crypto: crypto4xx: add aes-ccm support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [RFC 13/13] crypto: crypto4xx: add aes-gcm support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [RFC 11/13] crypto: crypto4xx: prepare for AEAD support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 10/13] crypto: crypto4xx: simplify sa and state context acquisition
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 06/13] crypto: crypto4xx: use the correct LE32 format for IV and key defs
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 07/13] crypto: crypto4xx: overhaul crypto4xx_build_pd()
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 08/13] crypto: crypto4xx: fix various warnings
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 09/13] crypto: crypto4xx: fix stalls under heavy load
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 05/13] crypto: crypto4xx: add backlog queue support
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 04/13] crypto: crypto4xx: increase context and scatter ring buffer elements
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 03/13] crypto: crypto4xx: fix type mismatch compiler error
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 02/13] crypto: crypto4xx: fix off-by-one AES-OFB
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- [PATCH 01/13] crypto: crypto4xx: wire up hmac_mc to hmac_muting
- From: Christian Lamparter <chunkeey@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH V2] Fix a sleep-in-atomic bug in shash_setkey_unaligned
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling
- From: Casey Leedom <leedom@xxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]