Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: n2_core: Convert to using %pOF instead of full_name
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 4/6] staging: ccree: Fix alignment issues in ssi_cipher.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 6/6] staging: ccree: Fix alignment issues in ssi_request_mgr.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 5/6] staging: ccree: Fix alignment issues in ssi_ivgen.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 3/6] staging: ccree: Fix alignment issues in ssi_buffer_mgr.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 2/6] staging: ccree: Fix alignment issues in ssi_hash.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 1/6] staging: ccree: Fix alignment issues in ssi_aead.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 0/6] Fix additional alignment issues in staging/ccree
- From: Simon Sandström <simon@xxxxxxxxxx>
- Re: [PATCH V2 0/6] Enable NX 842 compression engine on Power9
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 0/6] Enable NX 842 compression engine on Power9
- From: Sukadev Bhattiprolu <sukadev@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 4/5] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: "Allen Hubbe" <Allen.Hubbe@xxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix XTS-AES support on a version 5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH v4 5/5] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 3/5] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 2/5] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 4/5] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 0/5] make io{read|write}64 globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 4/4] arm64: dts: freescale: ls1088a: add crypto node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/4] arm64: dts: freescale: ls208xa: add crypto node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/4] arm64: dts: freescale: ls208xa: share aliases node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/4] crypto: caam/jr - add support for DPAA2 parts
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/4] crypto: caam - add Job Ring support for DPAA2 parts
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [v3 RFC PATCH 2/2] crypto: ecc: use caller's GFP flags
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: inside-secure - fix invalidation check in hmac_sha1_setkey
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [v3 RFC PATCH 1/2] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 8/8] crypto: aes - add meaningful help text to the various AES drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 7/8] crypto: arm64/aes-neon - reuse Sboxes from AES core module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 6/8] crypto: arm64/aes - avoid expanded lookup tables in the final round
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 5/8] crypto: arm/aes - avoid expanded lookup tables in the final round
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 3/8] crypto: aes - retire table based generic AES in favor of fixed time driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 4/8] crypto: x86/aes-ni - switch to generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 2/8] crypto - aes: use dedicated lookup tables for table based asm routines
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 1/8] drivers/crypto/Kconfig: drop bogus CRYPTO_AES dependencies
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v4 0/8] crypto: aes - retire table based generic AES
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] staging: ccree: Replace kzalloc with devm_kzalloc
- From: sunil.m@xxxxxxxxxxxx
- [PATCH v2 2/3] staging: ccree: Convert to devm_ioremap_resource for map, unmap
- From: sunil.m@xxxxxxxxxxxx
- [PATCH v2 3/3] staging: ccree: Use platform_get_irq and devm_request_irq
- From: sunil.m@xxxxxxxxxxxx
- Re: [PATCH] crypto: qat: fix spelling mistake: "runing" -> "running"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sahara : make of_device_ids const.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix some line spacing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Change all references to use the JOB ID macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp-platform: print error message on platform_get_irq failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: brcm - remove BCM_PDC_MBOX dependency in Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mediatek: fix error return code in mtk_crypto_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto hwrng consider quality value, remember user choice
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp: print error message on platform_get_irq failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/13] crypto: caam - fixes, clean-up
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-aes: fix error return code in omap_aes_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: fix error return code in omap_des_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: brcm: add NULL check on of_match_device() return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers: crypto: geode-aes: fixed coding style warnings and error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Introduce AMD Secure Processor device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: introduce Microchip / Atmel ECC driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] crypto: sun4i-ss: support the Security System PRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxc-scc: fix error code in mxc_scc_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp - Provide an error path for debugfs setup failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: virtio - Refacotor virtio_crypto driver for new virito crypto services
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation/bindings: crypto: remove the dma-mask property
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - do not parse the dma mask from dt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: cavium/nitrox - Change in firmware path.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: brcm - Fix SHA3-512 algorithm failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto/algapi - make crypto_xor() take separate dst and src arguments
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/2] crypto/algapi - refactor crypto_xor() to avoid memcpy()s
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] crypto/algapi - use separate dst and src operands for __crypto_xor()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH v12 4/4] LRNG - enable compile
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 4/4] LRNG - enable compile
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] crypto/algapi - make crypto_xor() take separate dst and src arguments
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v12 2/4] random: conditionally compile code depending on LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 2/4] random: conditionally compile code depending on LRNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto/algapi - make crypto_xor() take separate dst and src arguments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v12 2/4] random: conditionally compile code depending on LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 2/4] random: conditionally compile code depending on LRNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [RFC PATCH v12 2/4] random: conditionally compile code depending on LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH v12 4/4] LRNG - enable compile
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH v12 0/4] /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH v12 3/4] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH v12 1/4] crypto: make Jitter RNG directly accessible
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 6/6] crypto/nx: Add P9 NX support for 842 compression engine
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix XTS-AES support on a version 5 CCP
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH V2 0/6] Enable NX 842 compression engine on Power9
- From: Nicholas Piggin <nicholas.piggin@xxxxxxxxx>
- Re: [v3 RFC PATCH 2/2] crypto: ecc: use caller's GFP flags
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 RFC PATCH 1/2] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH V6 5/7] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] staging: ccree: Replace kzalloc with devm_kzalloc
- From: Suniel Mahesh <sunil.m@xxxxxxxxxxxx>
- Re: [PATCH V6 0/7] crypto: AES CBC multibuffer implementation
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH V2 6/6] crypto/nx: Add P9 NX support for 842 compression engine
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 5/6] crypto/nx: Add P9 NX specific error codes for 842 engine
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 4/6] crypto/nx: Add nx842_add_coprocs_list function
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 3/6] crypto/nx: Create nx842_delete_coprocs function
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 2/6] crypto/nx: Create nx842_configure_crb function
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 1/6] crypto/nx842: Rename nx842_powernv_function as icswx function
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 0/6] Enable NX 842 compression engine on Power9
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix XTS-AES support on a version 5 CCP
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [PATCH v2 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Martin Kaiser <martin@xxxxxxxxx>
- Re: [PATCH v2 2/3] ARM: i.MX25: add RNGC node to dtsi
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v3 2/3] ARM: i.MX25: add RNGC node to dtsi
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH v3 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Martin Kaiser <martin@xxxxxxxxx>
- [PATCH 4/4] csrypto: ccp - Expand RSA support for a v5 ccp
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 3/4] crypto: ccp - Add support for RSA on the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/4] crypto: Add akcipher_set_reqsize() function
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 1/4] crypto: ccp - Fix base RSA function for version 5 CCPs
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 0/4] Enable RSA Support on the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Fix XTS-AES support on a version 5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Update copyright dates for 2017.
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 1/2] dt-bindings: Document STM32 HASH bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: KPP questions and confusion
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 6/6] fscrypt: for v2 policies, support "fscrypt:" key prefix only
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: Document STM32 CRYP bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 5/6] fscrypt: cache the HMAC transform for each master key
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [RESEND,PATCH v4 3/3] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- KPP questions and confusion
- From: Kyle Rose <krose@xxxxxxxxx>
- Re: [RESEND,PATCH v4 3/3] crypto : stm32 - Add STM32F4 CRC32 support
- From: Lionel DEBIEVE <lionel.debieve@xxxxxx>
- RE: [PATCH] crypto: virtio - Refacotor virtio_crypto driver for new virito crypto services
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- [PATCH] drivers: staging: ccree: use __func__ to get function name in error messages.
- From: Dhananjay Balan <mail@xxxxxxxxx>
- Re: [PATCH 1/3] staging: ccree: Replace kzalloc with devm_kzalloc
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: inside-secure - fix invalidation check in hmac_sha1_setkey
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: inside-secure - fix the sha state length in hmac_sha1_setkey
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [RESEND,PATCH v4 3/3] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [RESEND,PATCH v4 2/3] dt-bindings : Document the STM32F4 CRC32 binding
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [RESEND,PATCH v4 0/2] Add support for the STM32F4 CRC32
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH] crypto: authencesn - Fix digest_null crash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Patch: Remove leftover from spinlock previous used in sahara driver
- From: Mogens Lauridsen <mlauridsen171@xxxxxxxxx>
- Fix dma unmap direction in iMX sahara aes calculation
- From: Mogens Lauridsen <mlauridsen171@xxxxxxxxx>
- [PATCH] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 2/3] staging: ccree: Convert to devm_ioremap_resource for map, unmap
- From: sunil.m@xxxxxxxxxxxx
- [PATCH 3/3] staging: ccree: Use platform_get_irq and devm_request_irq
- From: sunil.m@xxxxxxxxxxxx
- [PATCH 1/3] staging: ccree: Replace kzalloc with devm_kzalloc
- From: sunil.m@xxxxxxxxxxxx
- [PATCH 0/3] staging: ccree: Employ devm_* functions, remove redundant code
- From: sunil.m@xxxxxxxxxxxx
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/6] fscrypt: rename ->ci_master_key to ->ci_master_key_descriptor
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: [PATCH 00/12] staging: ccree: coding style fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Crypto Fixes for 4.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] staging: ccree: coding style fixes
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] Crypto_user: Make crypto user API available for all net ns
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 1/6] fscrypt: add v2 encryption context and policy
- From: Michael Halcrow <mhalcrow@xxxxxxxxxx>
- Re: Decreasing time for `rsa_init`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] Crypto_user: Make crypto user API available for all net ns
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] Crypto_user: Make crypto user API available for all net ns
- From: Christian Langrock <christian.langrock@xxxxxxxxxxx>
- [PATCH 2/2] crypto: stm32 - Support for STM32 HASH module
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/2] STM32 HASH crypto driver
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/2] dt-bindings: Document STM32 HASH bindings
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 1/3] crypto: stm32 - CRC use relaxed function
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] crypto: stm32 - solve crc issue during unbind
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 3/3] crypto: stm32 - Rename module to use generic crypto
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 0/3] STM32 CRC update
- From: Lionel Debieve <lionel.debieve@xxxxxx>
- [PATCH 2/3] dt-bindings: Document STM32 CRYP bindings
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH 3/3] crypto: stm32 - Support for STM32 CRYP crypto module
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH 0/3] STM32 CRYP crypto driver
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- [PATCH 1/3] crypto: engine - permit to enqueue aead_request
- From: Fabien Dessenne <fabien.dessenne@xxxxxx>
- Re: [PATCH v2] crypto: caam - free qman_fq after kill_fq
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] crypto: caam - free qman_fq after kill_fq
- From: Xulin Sun <xulin.sun@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: change hwrng device default permissions to 0444
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] crypto: brcm - Support more FlexRM rings than SPU engines.
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- [PATCH 03/12] staging: ccree: use proper printk format for dma_addr_t
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/12] staging: ccree: fix split strings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/12] staging: ccree: CamelCase to snake_case in func vars
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/12] staging: ccree: fix parenthesis alignment
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/12] staging: ccree: clean up struct ssi_aead_ctx
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/12] staging: ccree: CamelCase to snake_case in aead struct
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/12] staging: ccree: avoid constant comparison
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/12] staging: ccree: avoid unnecessary line continuation
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/12] staging: ccree: remove whitespace before a quoted newline
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/12] staging: ccree: remove func name from log messages
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/12] staging: ccree: kmalloc by sizeof var not type
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/12] staging: ccree remove unnecessary parentheses
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/12] staging: ccree: coding style fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: change hwrng device default permissions to 0444
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - free qman_fq after kill_fq
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/6] fscrypt: use HKDF-SHA512 to derive the per-inode encryption keys
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 2/6] fscrypt: rename ->ci_master_key to ->ci_master_key_descriptor
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 6/6] fscrypt: for v2 policies, support "fscrypt:" key prefix only
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/6] fscrypt: cache the HMAC transform for each master key
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/6] fscrypt: verify that the correct master key was supplied
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/6] fscrypt: add v2 encryption context and policy
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/6] fscrypt: key verification and KDF improvement
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- Re: Decreasing time for `rsa_init`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: Decreasing time for `rsa_init`
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Decreasing time for `rsa_init`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: make several functions static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - properly set IV after {en,de}crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chcr: Avoid algo allocation in softirq.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [BUGFIX] crypto: atmel: only treat EBUSY as transient if backlog
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: caam - fix signals handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: change hwrng device default permissions to 0444
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [GIT] Networking
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT] Networking
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] staging: ccree: move FIPS support to kernel infrastructure
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] staging: ccree: remove unnecessary cast on kmalloc
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] staging: ccree: fix checkpatch errors
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2] staging: ccree: Use __func__ instead of function name
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] staging: ccree: fix checkpatch errors
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] Stagingdriver cctree: Fix for checkpatch warning
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: HELP writing crypto driver for HW with blocksize hash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: HELP writing crypto driver for HW with blocksize hash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- Re: HELP writing crypto driver for HW with blocksize hash
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: brcm - remove BCM_PDC_MBOX dependency in Kconfig
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- HELP writing crypto driver for HW with blocksize hash
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: hwrng remember rng chosen by user
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: hwrng use rng source with best quality
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto hwrng consider quality value, remember user choice
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: caam - free qman_fq after kill_fq
- From: Xulin Sun <xulin.sun@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Remove default m setting from Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - Remove default m setting from Kconfig
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT] Networking
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto/algapi - refactor crypto_xor() to avoid memcpy()s
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] crypto/algapi - make crypto_xor() take separate dst and src arguments
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto/algapi - use separate dst and src operands for __crypto_xor()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - Remove default m setting from Kconfig
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 11/13] crypto: caam - remove unused variables in caam_drv_private
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 08/13] crypto: caam/qi - remove unused header sg_sw_sec4.h
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 12/13] crypto: caam - clean-up in caam_init_rng()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 13/13] crypto: caam - fix condition for the jump over key(s) command
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 01/13] crypto: caam/qi - fix typo in authenc alg driver name
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 10/13] crypto: caam - remove unused sg_to_sec4_sg_len()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 06/13] crypto: caam/qi - fix AD length endianness in S/G entry
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 02/13] crypto: caam/qi - fix compilation with DEBUG enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 09/13] crypto: caam/qi - lower driver verbosity
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 00/13] crypto: caam - fixes, clean-up
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 07/13] crypto: caam/qi - explicitly set dma_ops
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 04/13] crypto: caam/qi - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 03/13] crypto: caam/qi - fix compilation with CONFIG_DEBUG_FORCE_WEAK_PER_CPU=y
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 05/13] crypto: caam/qi - handle large number of S/Gs case
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 05/13] crypto: caam/qi - handle large number of S/Gs case
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 5/5] staging: ccree: fix switch case indentation
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 4/5] staging: ccree: export symbol immediately following function
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 3/5] staging: ccree: remove assignement in conditional
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 2/5] staging: ccree: fix placement of curly braces
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 1/5] staging: ccree: remove redudant semicolons
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 0/5] staging: ccree: fix checkpatch errors
- From: sleepingzucchini@xxxxxxxxx
- [PATCH 1/2] staging: ccree: remove unnecessary cast on kmalloc
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH 2/2] staging: ccree: use sizeof(*var) in kmalloc
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [RFC PATCH] crypto: caam - fix signals handling
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 12/13] crypto: caam - clean-up in caam_init_rng()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 13/13] crypto: caam - fix condition for the jump over key(s) command
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 12/13] crypto: caam - clean-up in caam_init_rng()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 11/13] crypto: caam - remove unused variables in caam_drv_private
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 08/13] crypto: caam/qi - remove unused header sg_sw_sec4.h
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 01/13] crypto: caam/qi - fix typo in authenc alg driver name
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 10/13] crypto: caam - remove unused sg_to_sec4_sg_len()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 09/13] crypto: caam/qi - lower driver verbosity
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 07/13] crypto: caam/qi - explicitly set dma_ops
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 06/13] crypto: caam/qi - fix AD length endianness in S/G entry
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 05/13] crypto: caam/qi - handle large number of S/Gs case
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 04/13] crypto: caam/qi - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 03/13] crypto: caam/qi - fix compilation with CONFIG_DEBUG_FORCE_WEAK_PER_CPU=y
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 02/13] crypto: caam/qi - fix compilation with DEBUG enabled
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 00/13] crypto: caam - fixes, clean-up
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: brcm: add NULL check on of_match_device() return value
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH v3 0/7] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/7] PKCS#7: Introduce verify_pkcs7_message_sig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/7] integrity: Introduce struct evm_hmac_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] ima: Support module-style appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/7] ima: Store measurement after appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/7] integrity: Introduce integrity_keyring_from_id
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/7] MODSIGN: Export module signature definitions.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH] drivers: crypto: geode-aes: fixed coding style warnings and error
- From: Chris Gorman <chrisjohgorman@xxxxxxxxx>
- [PATCH v4 5/5] crypto: ccp - remove ccp_present() check from device initialize
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v4 4/5] crypto: ccp - rename ccp driver initialize files as sp device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v4 3/5] crypto: cpp - Abstract interrupt registeration
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v4 2/5] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v4 1/5] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v4 0/5] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [bug report] crypto: inside-secure - add SafeXcel EIP197 crypto engine driver
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: Crypto Update for 4.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto Update for 4.13
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Antw: Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: Antw: Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Paul Koning <paulkoning@xxxxxxxxxxx>
- Crypto Update for 4.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Antw: Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/3] crypto: introduce Microchip / Atmel ECC driver
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: introduce Microchip / Atmel ECC driver
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: introduce Microchip / Atmel ECC driver
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH 2/3] crypto: introduce Microchip / Atmel ECC driver
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/3] MAINTAINERS: add a maintainer for Microchip / Atmel ECC driver
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/3] crypto: kpp: add get/set_flags helpers
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/3] crypto: introduce Microchip / Atmel ECC driver
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Antw: Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Ulrich Windl" <Ulrich.Windl@xxxxxxxxxxxxxxxxxxxx>
- Antw: Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Ulrich Windl" <Ulrich.Windl@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: arm/ghash - add NEON accelerated fallback for vmull.p64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: hwrng remember rng chosen by user
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: hwrng use rng source with best quality
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] crypto: sun4i-ss: support the Security System PRNG
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v4] crypto: sun4i-ss: support the Security System PRNG
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 RESEND 5/5] crypto: ccp - remove ccp_present() check from device initialize
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v3 RESEND 4/5] crypto: ccp - rename ccp driver initialize files as sp device
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v3 RESEND 3/5] crypto: cpp - Abstract interrupt registeration
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v3 RESEND 2/5] crypto: ccp - Introduce the AMD Secure Processor device
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v3 RESEND 1/5] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH] crypto: change hwrng device default permissions to 0444
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [RFT PATCH] crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/3] crypto: hwrng add sysfs attribute to show user selected rng
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] crypto: hwrng remember rng chosen by user
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: hwrng use rng source with best quality
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto hwrng consider quality value, remember user choice
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 04/28] crypto: marvell/cesa: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 05/28] crypto: mediatek: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 10/28] fscrypt: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 18/28] crypto: move gcm to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 23/28] ima: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 20/28] dm: move dm-verity to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 27/28] crypto: mediatek: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 28/28] crypto: adapt api sample to use async. op wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 26/28] crypto: qce: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 25/28] crypto: talitos: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 24/28] crypto: tcrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 22/28] cifs: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 21/28] fscrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 19/28] crypto: move testmgr to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 17/28] crypto: move drbg to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 16/28] crypto: move pub key to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 15/28] crypto: move algif to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 14/28] crypto: introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 13/28] crypto: adapt api sample to -EIOCBQUEUED as backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 12/28] ima: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 11/28] cifs: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 08/28] crypto: talitos: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 09/28] dm: verity: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 07/28] crypto: qce: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 06/28] crypto: omap: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 03/28] crypto: ccm: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 02/28] crypto: atmel: use -EIOCBQUEUED for backlog indication
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 01/28] crypto: change backlog return code to -EIOCBQUEUED
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 00/28] simplify crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/10] staging: ccree: Fix alignment issues in ssi_sysfs.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 09/10] staging: ccree: Fix alignment issues in ssi_sram_mgr.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 08/10] staging: ccree: Fix alignment issues in ssi_request_mgr.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 07/10] staging: ccree: Fix alignment issues in ssi_ivgen.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 06/10] staging: ccree: Fix alignment issues in ssi_hash.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 05/10] staging: ccree: Fix alignment issues in ssi_fips_local.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 04/10] staging: ccree: Fix alignment issues in ssi_driver.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 03/10] staging: ccree: Fix alignment issues in ssi_cipher.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 02/10] staging: ccree: Fix alignment issues in ssi_buffer_mgr.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 01/10] staging: ccree: Fix alignment issues in ssi_aead.c
- From: Simon Sandström <simon@xxxxxxxxxx>
- [PATCH 00/10] Fix alignment issues in staging/ccree
- From: Simon Sandström <simon@xxxxxxxxxx>
- [RFT PATCH] crypto: arm/ghash - add NEON accelerated fallback for vmull.p64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFT PATCH v2] crypto: arm64/gcm - implement native driver using v8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 4/4] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp-platform: print error message on platform_get_irq failure
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 1/2] crypto: Make hwrng choose rng source by quality.
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- [RFT PATCH v2] crypto: arm64/gcm - implement native driver using v8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: omap-aes: fix error return code in omap_aes_probe()
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH] crypto: omap-des: fix error return code in omap_des_probe()
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH] crypto: mxc-scc: fix error code in mxc_scc_probe()
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH] crypto: mxs-dcp: print error message on platform_get_irq failure
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH] crypto: ccp-platform: print error message on platform_get_irq failure
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- [PATCH] crypto: mediatek: fix error return code in mtk_crypto_probe()
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: Make hwrng choose rng source by quality.
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] crypto: arm64/gcm - implement native driver using v8 Crypto Extensions
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] staging: ccree: Use __func__ instead of function name
- From: karthik@xxxxxxxxxxxx
- [PATCH v3 RESEND 5/5] crypto: ccp - remove ccp_present() check from device initialize
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 RESEND 4/5] crypto: ccp - rename ccp driver initialize files as sp device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 RESEND 3/5] crypto: cpp - Abstract interrupt registeration
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 RESEND 2/5] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 RESEND 1/5] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 RESEND 0/5] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 5/5] crypto: ccp - remove ccp_present() check from device initialize
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 4/5] crypto: ccp - rename ccp driver initialize files as sp device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 3/5] crypto: cpp - Abstract interrupt registeration
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 2/5] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 1/5] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v3 0/5] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: wait in atomic context for an i2c crypto device to finish its execution
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 0/4] make io{read|write}64 more globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v3 1/4] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v3 2/4] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v3 4/4] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v3 3/4] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 14/14] staging: ccree: fix block comment style
- From: Frans Klaver <fransklaver@xxxxxxxxx>
- Re: [PATCH] Stagingdriver cctree: Fix for checkpatch warning
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] staging: ccree: Fix coding style and remove warnings
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] staging: ccree: Fix coding style and remove warnings
- From: karthik <karthik@xxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: wait in atomic context for an i2c crypto device to finish its execution
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- wait in atomic context for an i2c crypto device to finish its execution
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: Make hwrng choose rng source by quality.
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3] crypto: ccp - Provide an error path for debugfs setup failure
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [v3 RFC PATCH 2/2] crypto: ecc: use caller's GFP flags
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [v3 RFC PATCH 1/2] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [v3 RFC PATCH 0/2] crypto: ecdh, ecc fixes
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [v2 RFC PATCH 1/2] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxx>
- [v2 RFC PATCH 2/2] crypto: ecc: use caller's GFP flags
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxx>
- [v2 RFC PATCH 0/2] crypto: ecdh, ecc fixes
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxx>
- Re: [PATCH] crypto: caam - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: caam - properly set IV after {en,de}crypt
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Reenable sha1/aes in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - Reenable sha1/aes in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/2] staging: ccree: Fix coding style and remove warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/2] staging: ccree: Remove braces {} for single statement blocks
- From: karthik@xxxxxxxxxxxx
- [PATCH 0/2] staging: ccree: Fix coding style and remove warnings
- From: karthik@xxxxxxxxxxxx
- [PATCH 1/2] staging: ccree: Use __func__ instead of function name
- From: karthik@xxxxxxxxxxxx
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [BUGFIX] crypto: atmel: only treat EBUSY as transient if backlog
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH V6 7/7] crypto: AES CBC multi-buffer tcrypt
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 6/7] crypto: AES vectors for AES CBC multibuffer testing
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 3/7] crypto: AES CBC multi-buffer scheduler
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 2/7] crypto: AES CBC multi-buffer data structures
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 4/7] crypto: AES CBC by8 encryption
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 5/7] crypto: AES CBC multi-buffer glue code
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 1/7] crypto: Multi-buffer encryption infrastructure support
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V6 0/7] crypto: AES CBC multibuffer implementation
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 2/3] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 0/3] make io{read|write}64 more globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2] crypto: ccp - Provide a roll-back method for debugfs setup
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2] crypto: ccp - Provide a roll-back method for debugfs setup
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Change all references to use the JOB ID macro
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Fix some line spacing
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2] crypto: ccp - Provide a roll-back method for debugfs setup
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: sahara : make of_device_ids const.
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH] checkpatch: add *_ON_STACK to $declaration_macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/14] staging: ccree: remove redundant blank lines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/14] staging: ccree: no need for braces for single statements
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/14] staging: ccree: fix unmatched if/else braces
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/14] staging: ccree: remove comparisons to NULL
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/14] staging: ccree: remove custom type ssi_fips_error_t
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/14] staging: ccree: remove custom type tdes_keys_t
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/14] staging: ccree: remove custom type ssi_fips_state_t
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 13/14] staging: ccree: remove/add (un)needed blank lines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 14/14] staging: ccree: fix block comment style
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/14] staging: ccree: remove unused type CCFipsSyncStatus_t
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/14] staging: ccree: fix pointer location
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/14] staging: ccree: fix missing or redundant spaces
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/14] staging: ccree: drop comparsion to true/false
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 03/14] staging: ccree: fix else placement
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/14] staging: ccree: coding style fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] hwrng: Make hwrng choose rng source by quality.
- From: Harald Freudenberger <freude@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/7] iomap: implement ioread64 and iowrite64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/7] iomap: implement ioread64 and iowrite64
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: qat: fix spelling mistake: "runing" -> "running"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v3 net-next 1/4] tcp: ULP infrastructure
- From: "Levin, Alexander (Sasha Levin)" <alexander.levin@xxxxxxxxxxx>
- Re: [PATCH v3 net-next 1/4] tcp: ULP infrastructure
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v4] crypto: sun4i-ss: support the Security System PRNG
- From: Frans Klaver <fransklaver@xxxxxxxxx>
- [PATCH v4] crypto: sun4i-ss: support the Security System PRNG
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64
- From: Jyri Sarha <jsarha@xxxxxx>
- Re: [PATCH 1/7] drm/tilcdc: don't use volatile with iowrite64
- From: Jyri Sarha <jsarha@xxxxxx>
- Re: [PATCH] crypto: qat - avoid an uninitialized variable warning
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Nicholas A. Bellinger" <nab@xxxxxxxxxxxxxxx>
- Re: encrypt_done called from interrupt context on rk3288 crypto driver
- From: Zain Wang <wzz@xxxxxxxxxxxxxx>
- [PATCH v11 0/2] crypto: AF_ALG memory management fix
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 2/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v10 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 2/6] staging: ccree: register setkey for none hash macs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 1/6] staging: ccree: fix hash import/export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 4/6] staging: ccree: add clock management support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 3/6] staging: ccree: remove unused function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 5/6] staging: ccree: add DT bus coherency detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 6/6] staging: ccree: use signal safe completion wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 0/6] staging: ccree: bug fixes and TODO items for 4.13
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] staging: ccree: register setkey for none hash macs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] staging: ccree: fix hash import/export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 1/4] tcp: ULP infrastructure
- From: "Levin, Alexander (Sasha Levin)" <alexander.levin@xxxxxxxxxxx>
- [PATCH v2 7/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 3/7] staging: ccree: add support for older HW revisions
- From: kbuild test robot <lkp@xxxxxxxxx>
- RE: [bug] sha1-avx2 and read beyond
- From: "Albrekht, Ilya" <ilya.albrekht@xxxxxxxxx>
- Re: [PATCH 0/3] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 3/7] staging: ccree: add support for older HW revisions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] staging: ccree: add clock management support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] staging: ccree: register setkey for none hash macs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce AMD Secure Processor device
- From: Pavel Machek <pavel@xxxxxx>
- Re: Regarding Porting of hardware cryptography to Linux kernel
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v6 0/2] IV Generation algorithms for dm-crypt
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 7/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v1] crypto: brcm - software fallback for cryptlen zero
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v2 3/3] crypto: cpp - Abstract interrupt registeration
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v2 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v2 0/3] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH] crypto: virtio - Refacotor virtio_crypto driver for new virito crypto services
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- Re: [PATCH] Documentation/bindings: crypto: remove the dma-mask property
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] Documentation/bindings: crypto: remove the dma-mask property
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - do not parse the dma mask from dt
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: inside-secure - do not parse the dma mask from dt
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: chcr: Avoid algo allocation in softirq.
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH] crypto: inside-secure - do not parse the dma mask from dt
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [linux-next:master 7715/9581] drivers/crypto/cavium/cpt/cptvf_algs.c:225:5: sparse: symbol 'cvm_encrypt' was not declared. Should it be static?
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [RFC PATCH linux-next] crypto: cvm_encrypt() can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH][crypto-next] crypto: cavium/nitrox - Change in firmware path.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- Re: [PATCH 1/1] cavium: Add firmware for CNN55XX crypto driver.
- From: srikanth jampala <jsrikanth@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v1] crypto: brcm - Fix SHA3-512 algorithm failure
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- [PATCH v1] crypto: brcm - software fallback for cryptlen zero
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: dm-crypt IV generation (summary)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: encrypt_done called from interrupt context on rk3288 crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: brcm - software fallback for cryptlen zero
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: brcm - Fix SHA3-512 algorithm failure
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- Re: [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: brcm - software fallback for cryptlen zero
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- Re: [PATCH v6 0/2] IV Generation algorithms for dm-crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] staging: ccree: add support for older HW revisions
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Radu Solea <radu.solea@xxxxxxx>
- Re: [PATCH 7/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: brcm - Fix SHA3-512 algorithm failure
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] x86, boot, LLVM: Use regparm=0 for memcpy and memset
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Richard Henderson <rth@xxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 3/7] asm-generic/io.h: make ioread64 and iowrite64 universally available
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 3/7] asm-generic/io.h: make ioread64 and iowrite64 universally available
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] asm-generic/io.h: make ioread64 and iowrite64 universally available
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 3/7] asm-generic/io.h: make ioread64 and iowrite64 universally available
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] cavium: Add firmware for CNN55XX crypto driver.
- From: Kyle McMartin <kyle@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: "Stephen Bates" <sbates@xxxxxxxxxxxx>
- RE: [PATCH 5/7] ntb: ntb_hw_intel: remove ioread64 and iowrite64 hacks
- From: "Jiang, Dave" <dave.jiang@xxxxxxxxx>
- Re: [PATCH 3/4] crypto: ccp - Add support for RSA on the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 4/7] alpha: provide ioread64 and iowrite64 implementations
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 5/7] ntb: ntb_hw_intel: remove ioread64 and iowrite64 hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 2/7] iomap: implement ioread64 and iowrite64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 7/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 3/7] asm-generic/io.h: make ioread64 and iowrite64 universally available
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 0/7] cleanup issues with io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 1/7] drm/tilcdc: don't use volatile with iowrite64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: ccp - Expand RSA support for a v5 ccp
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2] of: update ePAPR references to point to Devicetree Specification
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: ccp - Add support for RSA on the CCP
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v2] of: update ePAPR references to point to Devicetree Specification
- From: frowand.list@xxxxxxxxx
- Re: [PATCH] of: update ePAPR references to point to Devicetree Specification
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: ccp - Fix base RSA function for version 5 CCPs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/7] staging: ccree: fix hash import/export
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Radu Solea <radu.solea@xxxxxxx>
- Re: [PATCH] staging: ccree: fix coding style error
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH V2] staging: ccree: - style fix, spaces and tabs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/7] staging: ccree: bug fixes and TODO items for 4.13
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/7] staging: ccree: fix hash import/export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/7] staging: ccree: add support for older HW revisions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/7] staging: ccree: register setkey for none hash macs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/7] staging: ccree: remove unused function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/7] staging: ccree: add clock management support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/7] staging: ccree: add DT bus coherency detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 7/7] staging: ccree: use signal safe completion wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] staging: ccree: add DT bus coherency detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] staging: ccree: add clock management support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - avoid an uninitialized variable warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Regarding Porting of hardware cryptography to Linux kernel
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 3/3] crypto: cpp - Abstract interrupt registeration
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 0/3] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH] crypto: ecdh: fix concurrency on ecdh_ctx
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] staging: ccree: add DT bus coherency detection
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: cavium/nitrox - dma_mapping_error() returns bool
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Release locks before returning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - fix gfp allocation flags (part II)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: caam - fix gfp allocation flags (part I)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix typo in docs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] staging: ccree: add clock management support
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/7] staging: ccree: bug fixes and TODO items for 4.13
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] staging: ccree: bug fixes and TODO items for 4.13
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: XFRM Stats
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] staging: ccree: bug fixes and TODO items for 4.13
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/7] staging: ccree: add support for older HW revisions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/7] staging: ccree: remove unused function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/7] staging: ccree: register setkey for none hash macs
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 7/7] staging: ccree: use signal safe completion wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 6/7] staging: ccree: add DT bus coherency detection
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/7] staging: ccree: add clock management support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/7] staging: ccree: fix hash import/export
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/7] staging: ccree: bug fixes and TODO items for 4.13
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: XFRM Stats
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: ccp - Add support for RSA on the CCP
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v6 0/2] IV Generation algorithms for dm-crypt
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- [PATCH v6 1/2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- [PATCH v6 2/2] crypto: Multikey template for essiv
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: XFRM Stats
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: support the Security System PRNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RESEND,PATCH v4 2/5] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [RESEND,PATCH v4 1/5] dt-bindings : Document the STM32F4 CRC32 binding
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [RESEND,PATCH v4 0/5] Add support for the STM32F4 CRC32
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH 4/4] crypto: ccp - Expand RSA support for a v5 ccp
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 3/4] crypto: ccp - Add support for RSA on the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/4] crypto: Add akcipher_set_reqsize() function
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 1/4] crypto: ccp - Fix base RSA function for version 5 CCPs
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 0/4] Enable full RSA support on CCPs
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Provide a roll-back method for debugfs setup
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [kernel-hardening] [PATCH] random: warn when kernel uses unseeded randomness
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v10 2/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v10 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v10 0/2] crypto: AF_ALG memory management fix
- From: Stephan Müller <smueller@xxxxxxxxxx>
- XFRM Stats
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH] gcm - fix setkey cache coherence issues
- From: Radu Solea <radu.solea@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]