Linux Crypto
[Prev Page][Next Page]
- RE: [PATCH v0] crypto: virtio - Refacotor virtio_crypto driver for new virito crypto services
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: [PATCH] random: warn when kernel uses unseeded randomness
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] staging: ccree: fix coding style error
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH] random: silence compiler warnings and fix race
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH] random: silence compiler warnings and fix race
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v2 0/3] add support of hardware random generator on MediaTek MT7622
- From: Sean Wang <sean.wang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium: make several functions static
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] add support of hardware random generator on MediaTek MT7622
- From: Torsten Duwe <duwe@xxxxxxx>
- [PATCH 1/6] Staging: ccree: add space around comma, brace and operator.
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 2/6] staging: ccree: move brace { to previous line for if.
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 3/6] staging: ccree: move '{' to next line for function.
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 5/6] staging: ccree: remove improper space
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 6/6] staging: ccree: move else to follow close brace '}'
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 4/6] staging: ccree: move * to close variable name instead of type.
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH] staging: ccree: fix coding style error
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- Re: [PATCH v2 0/3] add support of hardware random generator on MediaTek MT7622
- From: Sean Wang <sean.wang@xxxxxxxxxxxx>
- Re: [PATCH 01/11] Fix coding style of driver/staging/ccree/ssi_aead.c ERROR: space required after that
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: support the Security System PRNG
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: cavium: make several functions static
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: support the Security System PRNG
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 7/7] crypto: aes - allow generic AES to be replaced by fixed time AES
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 6/7] crypto: aes - add meaningful help text to the various AES drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 4/7] crypto: arm64/aes-neon - reuse Sboxes from AES core module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: aes - repurpose CRYPTO_AES and introduce CRYPTO_AES_GENERIC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 3/7] crypto: x86/aes-ni - switch to generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/7] crypto: aes - refactor shared routines into separate core module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 1/7] drivers/crypto/Kconfig: drop bogus CRYPTO_AES dependencies
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/7] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: sun4i-ss: support the Security System PRNG
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 05/11] Fix ERROR: space prohibited after that open parenthesis '('
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 02/11] Fix ERROR: spaces required around that
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 01/11] Fix coding style of driver/staging/ccree/ssi_aead.c ERROR: space required after that
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH] random: silence compiler warnings and fix race
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH] random: silence compiler warnings and fix race
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v6 1/5] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 11/11] Fix ERROR: "foo* bar" should be "foo *bar"
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 10/11] Fix ERROR: else should follow close brace '}'
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 09/11] Fix ERROR: space prohibited before that ','
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 08/11] Fix ERROR: space prohibited before open square bracket '['
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 07/11] Fix ERROR: open brace '{' following function declarations go on the next line
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 06/11] Fix ERROR: space prohibited before that close parenthesis ')'
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 05/11] Fix ERROR: space prohibited after that open parenthesis '('
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 04/11] Fix ERROR: that open brace { should be on the previous line
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 03/11] Fix ERROR: space required before the open brace
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 02/11] Fix ERROR: spaces required around that
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- [PATCH 01/11] Fix coding style of driver/staging/ccree/ssi_aead.c ERROR: space required after that
- From: Jhih-Ming Huang <fbihjmeric@xxxxxxxxx>
- Re: [PATCH] crypto: vmx: remove unnecessary check
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: make of_device_ids const.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2: make of_device_ids const
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: inside-secure - various improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] Bug fixes and ctr mode of operation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: cavium: fix spelling mistake "Revsion" -> "Revision"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: omap-aes: fix spelling mistake "Encryptio" -> "Encryption"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - add testvector for pkcs1pad(rsa)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] add support of hardware random generator on MediaTek MT7622
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] rsa-pkcs1pad: use constant time memory comparison for MACs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx - fix an error code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- [PATCH] crypto: ccp - Release locks before returning
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 0/6] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: cavium/nitrox - dma_mapping_error() returns bool
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] of: update ePAPR references to point to Devicetree Specification
- From: Frank Rowand <frowand.list@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [cryptodev:master 77/100] drivers/crypto/ccp/ccp-debugfs.c:303:3-9: preceding lock on line 299 (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 2/2] crypto: caam - fix gfp allocation flags (part II)
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - fix gfp allocation flags (part I)
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH] crypto: fix typo in docs
- From: Benjamin Peterson <bp@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: engine - replace pr_xxx by dev_xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: use consistent format for errors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: brcm: fix spelling mistake: "fallbck" -> "fallback"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] ARM: sun5i: cryptographic engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi: Use pr_err common logging style.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algapi: Use pr_err common logging style.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: crypto: Fixed bugs, added example usage of calc_hash().
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: glue_helper - Delete some dead code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mediatek - drop .owner field in mtk_crypto_driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aes_ti - fix comment for MixColumns step
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Add more algorithms and some misc cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto/ccp: return NULL instead of 0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] crypto: ccp - Add debugfs entries for CCP information
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Extend max key length for SHA384/512-HMAC and AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [-next] crypto: 842 propagate PTR_ERR value instead of -ENOMEM
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] crypto: aes - allow generic AES to be omitted
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] of: update ePAPR references to point to Devicetree Specification
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: rng: add MediaTek MT7622 Hardware Random Generator bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/1] Fix coding style of driver/staging/ccree/ssi_aead.c
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Paul Koning <paulkoning@xxxxxxxxxxx>
- [PATCH v2 24/31] hw_random.txt: standardize document format
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH v2 25/29] padata.txt: standardize document format
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Lee Duncan <lduncan@xxxxxxxx>
- [PATCH V2] staging: ccree: - style fix, spaces and tabs
- From: Derek Robson <robsonde@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v3 net-next 1/4] tcp: ULP infrastructure
- From: Christoph Paasch <christoph.paasch@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: Lee Duncan <lduncan@xxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: Sebastian Andrzej Siewior <sebastian@xxxxxxxxxxxxx>
- Re: [PATCH] random: silence compiler warnings and fix race
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH 1/1] cavium: Add firmware for CNN55XX crypto driver.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH 0/1] Add firmware for CNN55XX crypto driver
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 6/6] crypto: aes - allow generic AES to be replaced by fixed time AES
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] crypto: aes - add meaningful help text to the various AES drivers
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: aes - repurpose CRYPTO_AES and introduce CRYPTO_AES_GENERIC
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: x86/aes-ni - switch to generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] crypto: aes - refactor shared routines into separate core module
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] drivers/crypto/Kconfig: drop bogus CRYPTO_AES dependencies
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] crypto: aes - allow generic AES to be omitted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: caam: make of_device_ids const.
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH] crypto: vmx: remove unnecessary check
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: Sebastian Andrzej Siewior <sebastian@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] integrity: Small code improvements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] ima: Log the same audit cause whenever a file has no signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] ima: Simplify policy_func_show.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2: make of_device_ids const
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: n2: make of_device_ids const
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/13] crypto: inside-secure - various improvements
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 12/13] crypto: inside-secure - increase the batch size
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 09/13] crypto: inside-secure - stop requeueing failed requests
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/13] crypto: inside-secure - use one queue per hw ring
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/13] crypto: inside-secure - enable single WR in DSE configuration
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] crypto: inside-secure - use the base_end pointer in ring rollback
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/13] crypto: inside-secure - optimize DSE bufferability control
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/13] crypto: inside-secure - fix incorrect DSE data cache setting
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/13] crypto: inside-secure - align the cipher and hash send functions
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/13] crypto: inside-secure - update the context and request later
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/13] crypto: inside-secure - fix the ring wr_cache offset
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/13] crypto: inside-secure - use hmac ipad/opad constants
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 11/13] crypto: inside-secure - only dequeue when needed
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/13] crypto: inside-secure - get the backlog before dequeueing the request
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- pkcs1pad and RSA e
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/9] Bug fixes and ctr mode of operation
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/9] crypto: chcr - Fix fallback key setting
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/9] crypto: chcr - Return correct error code
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 6/9] chcr - Add debug counters
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 7/9] MAINTAINERS:Add maintainer for chelsio crypto driver
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 9/9] crypto: chcr - Select device in Round Robin fashion
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 8/9] crypto: chcr - Ensure Destination sg entry size less than 2k
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 5/9] crypto:chcr - Add ctr mode and process large sg entries for cipher
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 4/9] crypto: chcr - Avoid changing request structure
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/9] crypto: chcr - Pass lcb bit setting to firmware
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Crypto Fixes for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- [PATCH] random: silence compiler warnings and fix race
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 0/4] kernel TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: Sebastian Andrzej Siewior <sebastian@xxxxxxxxxxxxx>
- [PATCH v3 net-next 4/4] tls: Documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v3 net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v3 net-next 2/4] tcp: export do_tcp_sendpages and tcp_rate_check_app_limited functions
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v3 net-next 1/4] tcp: ULP infrastructure
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v3 net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Alg errors with Intel QAT Card
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- [PATCH] of: update ePAPR references to point to Devicetree Specification
- From: frowand.list@xxxxxxxxx
- Re: Alg errors with Intel QAT Card
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: Alg errors with Intel QAT Card
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: Alg errors with Intel QAT Card
- From: Neil Horman <nhorman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: cavium: fix spelling mistake "Revsion" -> "Revision"
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: cavium: fix spelling mistake "Revsion" -> "Revision"
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH][crypto-next] crypto: cavium: fix spelling mistake "Revsion" -> "Revision"
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] Appended signatures support for IMA appraisal
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: rng: add MediaTek MT7622 Hardware Random Generator bindings
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- [PATCH][crypto-next] crypto: cavium: fix spelling mistake "Revsion" -> "Revision"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][crypto-next] crypto: omap-aes: fix spelling mistake "Encryptio" -> "Encryption"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] arm64: marvell: dts: add dma-mask in crypto nodes for 7k/8k
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 62/75] crypto/rsa-pkcs1pad.c:680:21: error: assignment from incompatible pointer type
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [cryptodev:master 62/75] crypto/rsa-pkcs1pad.c:680:21: error: assignment from incompatible pointer type
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: testmgr - add testvector for pkcs1pad(rsa)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: rng: add MediaTek MT7622 Hardware Random Generator bindings
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH v2 0/3] add support of hardware random generator on MediaTek MT7622
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH v2 2/3] hwrng: mtk - add runtime PM support
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH v2 3/3] MAINTAINERS: add entry for MediaTek Random Number Generator
- From: <sean.wang@xxxxxxxxxxxx>
- RE: Alg errors with Intel QAT Card
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 00/12] arm64: crypto: prepare for new kernel mode NEON policy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for the STM32F4 CRC32
- From: Alexandre Torgue <alexandre.torgue@xxxxxx>
- Re: [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] rsa-pkcs1pad: use constant time memory comparison for MACs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v6 1/5] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Add more algorithms and some misc cleanups
- From: George Cherian <gcherianv@xxxxxxxxx>
- [PATCH v9 2/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v9 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v9 0/2] crypto: AF_ALG memory management fix
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 12/12] crypto: arm64/aes-bs - implement non-SIMD fallback for AES-CTR
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 11/12] crypto: arm64/chacha20 - take may_use_simd() into account
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/12] crypto: arm64/aes-blk - add a non-SIMD fallback for synchronous CTR
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/12] crypto: arm64/aes-ce-ccm: add non-SIMD generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/12] crypto: arm64/aes-ce-cipher: add non-SIMD generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/12] crypto: arm64/aes-ce-cipher - match round key endianness with generic code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/12] crypto: arm64/sha2-ce - add non-SIMD scalar fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/12] crypto: arm64/sha1-ce - add non-SIMD generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/12] crypto: arm64/crc32 - add non-SIMD scalar fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/12] crypto: arm64/crct10dif - add non-SIMD generic fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/12] crypto: arm64/ghash-ce - add non-SIMD scalar fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/12] arm64: neon: replace generic definition of may_use_simd()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 00/12] arm64: crypto: prepare for new kernel mode NEON policy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: crypto4xx - fix an error code
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2] X.509: Fix error code in x509_cert_parse()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: rng - move __crypto_rng_cast to the rng header
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rng: Remove unused function __crypto_rng_cast()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] Add support for Cavium CNN55XX crypto adapters.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] crypto: ecdh - add privkey generation support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: omap fixes / changes for 4.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] X.509: Fix error code in x509_cert_parse()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/14] fixes for kpp and akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] remove mediatek ethif clock in crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] crypto: introduce crypto wait for async op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Alg errors with Intel QAT Card
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- RE: Can someone check linux kernel 4.4, and 4.9 rfc4309 test vectors?
- From: Che-Min Hsieh <cheminh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Appended signatures support for IMA appraisal
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Can someone check linux kernel 4.4, and 4.9 rfc4309 test vectors?
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] Drivers: ccree - style fix
- From: Derek Robson <robsonde@xxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: Crypto Fixes for 4.12
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Kevin Easton <kevin@xxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Crypto Fixes for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 11/13] net/route: use get_random_int for random counter
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 10/13] net/neighbor: use get_random_u32 for 32-bit hash random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 09/13] rhashtable: use get_random_u32 for hash_rnd
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 07/13] ceph: ensure RNG is seeded before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v2 3/6] ima: Log the same audit cause whenever a file has no signature
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] integrity: Introduce struct evm_hmac_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] ima: Support module-style appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] MODSIGN: Export module signature definitions.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] ima: Simplify policy_func_show.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] integrity: Small code improvements
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 04/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 05/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 05/13] crypto/rng: ensure that the RNG is ready before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 04/13] security/keys: ensure RNG is seeded before use
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 03/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 02/13] random: add synchronous API for the urandom pool
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v4 01/13] random: invalidate batched entropy after crng init
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v5 05/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 03/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 02/13] random: add synchronous API for the urandom pool
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 07/13] ceph: ensure RNG is seeded before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 00/13] Unseeded In-Kernel Randomness Fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 04/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 06/13] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 11/13] net/route: use get_random_int for random counter
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 09/13] rhashtable: use get_random_u32 for hash_rnd
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 10/13] net/neighbor: use get_random_u32 for 32-bit hash random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v5 00/13] Unseeded In-Kernel Randomness Fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v1 2/2] dt-bindings: crypto: remove mediatek ethif clock
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 net-next 1/4] tcp: ULP infrastructure
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 03/13] random: invalidate batched entropy after crng init
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: add generic bindings for MediaTek SoCs
- From: Sean Wang <sean.wang@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: Can someone check linux kernel 4.4, and 4.9 rfc4309 test vectors?
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Can someone check linux kernel 4.4, and 4.9 rfc4309 test vectors?
- From: Che-Min Hsieh <cheminh@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: add generic bindings for MediaTek SoCs
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: add generic bindings for MediaTek SoCs
- From: Sean Wang <sean.wang@xxxxxxxxxxxx>
- Re: [PATCH v4 00/13] Unseeded In-Kernel Randomness Fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v4 01/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 03/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 05/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 04/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 09/13] rhashtable: use get_random_u32 for hash_rnd
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 07/13] ceph: ensure RNG is seeded before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 10/13] net/neighbor: use get_random_u32 for 32-bit hash random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 11/13] net/route: use get_random_int for random counter
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 06/13] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 02/13] random: add synchronous API for the urandom pool
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v4 00/13] Unseeded In-Kernel Randomness Fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v2 net-next 4/4] tls: Documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 2/4] tcp: export do_tcp_sendpages and tcp_rate_check_app_limited functions
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 1/4] tcp: ULP infrastructure
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH v2 net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: engine - replace pr_xxx by dev_xxx
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/4] Staging: ccree: cc_crypto_ctx.h: Added * on subsequent lines of a comment block.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 05/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: add generic bindings for MediaTek SoCs
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [PATCH v3 05/13] security/keys: ensure RNG is seeded before use
- From: David Howells <dhowells@xxxxxxxxxx>
- [BUGFIX PATCH] staging: ccree: fix buffer copy
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v3 01/13] random: add synchronous API for the urandom pool
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 02/13] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 06/13] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 03/13] random: invalidate batched entropy after crng init
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 05/13] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 04/13] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 07/13] ceph: ensure RNG is seeded before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 12/13] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 08/13] cifs: use get_random_u32 for 32-bit lock random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 10/13] net/neighbor: use get_random_u32 for 32-bit hash random
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 13/13] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 11/13] net/route: use get_random_int for random counter
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 09/13] rhashtable: use get_random_u32 for hash_rnd
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v3 00/13] Unseeded In-Kernel Randomness Fixes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC v2 5/8] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: workqueue list corruption
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] crypto: brcm: fix spelling mistake: "fallbck" -> "fallback"
- From: Steve Lin <steven.lin1@xxxxxxxxxxxx>
- [PATCH] crypto: testmgr: use consistent format for errors
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH RFC v2 2/8] random: add get_random_{bytes,u32,u64,int,long,once}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 8/8] ceph: ensure RNG is seeded before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 4/8] crypto/rng: ensure that the RNG is ready before using
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 1/8] random: add synchronous API for the urandom pool
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 5/8] security/keys: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 6/8] iscsi: ensure RNG is seeded before use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 7/8] bluetooth/smp: ensure RNG is properly seeded before ECDH use
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 3/8] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC v2 0/8] get_random_bytes_wait family of APIs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] Drivers: ccree - style fix, spaces and tabs
- From: Derek Robson <robsonde@xxxxxxxxx>
- workqueue list corruption
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [PATCH] crypto: brcm: fix spelling mistake: "fallbck" -> "fallback"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Staging: ccree: cc_crypto_ctx.h: Added * on subsequent lines of a comment block.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Staging: ccree: ssi_aead.h: Fixed a comment coding style issue.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 03/18] staging: ccree: remove 48 bit dma addr sim
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 07/18] staging: ccree: remove cycle count debug support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 10/18] staging: ccree: remove unused struct
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 11/18] staging: ccree: use snake_case for hash enums
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 13/18] staging: ccree: remove dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 14/18] staging: ccree: remove spurious blank line
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 12/18] staging: ccree: drop no longer used macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 09/18] staging: ccree: remove custom bitfield macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 08/18] staging: ccree: move request_mgr to generic bitfield ops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 04/18] staging: ccree: refactor LLI access macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 16/18] staging: ccree: remove last remnants of sash algo
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 18/18] staging: ccree: remove descriptor context definitions
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 17/18] staging: ccree: remove last remnants of sblkcipher
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 15/18] staging: ccree: fix wrong whitespace usage
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 06/18] staging: ccree: remove unused debug macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 05/18] staging: ccree: move M/LLI defines to header file
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 02/18] staging: ccree: refactor HW command FIFO access
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 01/18] staging: ccree: replace bit shift with BIT macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 00/18] additional driver cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 02/20] staging: ccree: replace bit shift with BIT macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: get_random_bytes returns bad randomness before seeding is complete
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- [PATCH 4/4] Staging: ccree: cc_crypto_ctx.h: Added * on subsequent lines of a comment block
- From: srishti sharma <srishtishar@xxxxxxxxx>
- [PATCH 3/4] Staging: ccree: cc_crypto_ctx.h: Fixed * alignment issues in a comment block
- From: srishti sharma <srishtishar@xxxxxxxxx>
- [PATCH 2/4] Staging: ccree: cc_crypto_ctx.h: Fixed trailing */ issue in a comment block
- From: srishti sharma <srishtishar@xxxxxxxxx>
- [PATCH 1/4] Staging: ccree: cc_crypto_ctx.h: Added * on subsequent lines of a comment block.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- [PATCH 0/4] Fixed comment coding style issues.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- [PATCH][V2] staging: ccree: fix spelling mistake: "chanined" -> "chained"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] taging: ccree: fix spelling mistake: "chanined" -> "chained"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] Staging: ccree: ssi_aead.h: Fixed a pointer declaration error.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: [PATCH V2 00/27] Drivers: ccree - align block comments
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 01/27] Drivers: ccree: ssi_sysfs.h - align block comments
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/20] staging: ccree: replace bit shift with BIT macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Staging: ccree: ssi_aead.h: Fixed a pointer declaration error.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Staging: ccree: cc_crypto_ctx.h: Fixed a comment coding style issue.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Staging: ccree: ssi_aead.h: Fixed a comment coding style issue.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH RFC 2/3] random: add get_random_{bytes,u32,u64,int,long}_wait family
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC 3/3] random: warn when kernel uses unseeded randomness
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC 1/3] random: add synchronous API for the urandom pool
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH RFC 0/3] get_random_bytes seed blocking
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: get_random_bytes returns bad randomness before seeding is complete
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] Staging: ccree: ssi_aead.h: Fixed a pointer declaration error.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] Re: get_random_bytes returns bad randomness before seeding is complete
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [kernel-hardening] Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: get_random_bytes returns bad randomness before seeding is complete
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- crypto: Work around deallocated stack frame reference gcc bug on sparc.
- From: David Miller <davem@xxxxxxxxxxxxx>
- get_random_bytes returns bad randomness before seeding is complete
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 2/5] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- Re: [PATCH v3 12/13] ARM: sun5i: add a cryptographic engine node
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 13/13] ARM: dts: sunxi: add SoC specific compatibles for the crypto nodes
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] crypto: caam - properly set IV after {en,de}crypt
- From: David Gstir <david@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] crypto: caam - fix k*alloc if called from own cipher callback
- From: David Gstir <david@xxxxxxxxxxxxx>
- [RFC PATCH 0/2] crypto: caam - fix cts(cbc(aes)) with CAAM driver
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v3 13/13] ARM: dts: sunxi: add SoC specific compatibles for the crypto nodes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/13] crypto: sun4i-ss: fix large block size support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 09/13] crypto: sun4i-ss: move from ablkcipher to skcipher API
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 10/13] crypto: sun4i-ss: add the CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 12/13] ARM: sun5i: add a cryptographic engine node
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 04/13] crypto: sun4i-ss: cannot use DMA is the request is 0 length
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 00/13] ARM: sun5i: cryptographic engine support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 06/13] crypto: sun4i-ss: simplify the pad length calculation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 05/13] crypto: sun4i-ss: do not dynamically set parts of the last buffer to 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 07/13] crypto: sun4i-ss: simplify the appended bit assignment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 08/13] crypto: sun4i-ss: use GENMASK to generate masks
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 03/13] crypto: sun4i-ss: use lower/upper_32_bits helpers
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 02/13] crypto: sun4i-ss: remove conditional checks against 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 01/13] crypto: sun4i-ss: group variable definitions in sun4i_hash()
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/20] staging: ccree: remove spurious blank lines
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 01/20] staging: ccree: remove spurious blank lines
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 01/20] staging: ccree: remove spurious blank lines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 02/20] staging: ccree: replace bit shift with BIT macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 03/20] staging: ccree: fix longer than 80 chars lines
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 04/20] staging: ccree: fix operator spacing
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 05/20] staging: ccree: fix comments formatting
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 09/20] staging: ccree: refactor LLI access macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 08/20] staging: ccree: remove 48 bit dma addr sim
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 12/20] staging: ccree: remove cycle count debug support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 15/20] staging: ccree: remove unused struct
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 14/20] staging: ccree: remove custom bitfield macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 17/20] staging: ccree: drop no longer used macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 16/20] staging: ccree: use snake_case for hash enums
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 19/20] staging: ccree: remove spurious blank line
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 20/20] staging: ccree: fix wrong whitespace usage
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 18/20] staging: ccree: remove dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 13/20] staging: ccree: move request_mgr to generic bitfield ops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 11/20] staging: ccree: remove unused debug macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 10/20] staging: ccree: move M/LLI defines to header file
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 07/20] staging: ccree: refactor HW command FIFO access
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 06/20] staging: ccree: add parentheses to macro argument
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 00/20] additional driver cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [-next] crypto: 842 propagate PTR_ERR value instead of -ENOMEM
- From: Zhang Shengju <zhangshengju@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt-bindings: timeriomem_rng: Add entropy quality property
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm - enable module autoloading
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/2] crypto: mediatek - remove redundant clock setting
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH v1 2/2] dt-bindings: crypto: remove mediatek ethif clock
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH v1 0/2] remove mediatek ethif clock in crypto driver
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: mediatek - update DT binding documentation
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: mediatek - update DT binding documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/4] dt-bindings: rng: add generic bindings for MediaTek SoCs
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH 2/4] hwrng: mtk - add support for MT7622 SoC
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH 3/4] hwrng: mtk - add runtime PM support
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH 4/4] MAINTAINERS: add entry for MediaTek Random Number Generator
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [sparc64] crc32c misbehave
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [sparc64] crc32c misbehave
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] Staging: ccree: cc_crypto_ctx.h: Fixed a comment coding style issue.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: [sparc64] crc32c misbehave
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH] Staging: ccree: cc_crypto_ctx.h: Fixed a comment coding style issue.
- From: srishti sharma <srishtishar@xxxxxxxxx>
- Re: [sparc64] crc32c misbehave
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [PATCH v2 2/5] dt-bindings : Document the STM32F4 CRC32 binding
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- Re: [PATCH v2 2/5] dt-bindings : Document the STM32F4 CRC32 binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V2 00/27] Drivers: ccree - align block comments
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v3 1/2] crypto: ecdh - add privkey generation support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: ecdh - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: ecdh - add privkey generation support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v3 1/2] crypto: ecdh - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 2/2] crypto: testmgr - add genkey kpp test
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 0/2] crypto: ecdh - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v5 04/14] crypto: ecc - rename ecdh_make_pub_key()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: cavium - Add debugfs support in CNN55XX driver.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: cavium - Add support for CNN55XX adapters.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v2 0/3] Add support for Cavium CNN55XX crypto adapters.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- Re: [PATCH v2 00/12] ARM: sun5i: cryptographic engine support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2 12/12] ARM: sun5i: add a cryptographic engine node
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 00/27] Drivers: ccree - align block comments
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] ARM: sun5i: add a cryptographic engine node
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH V2 23/27] Drivers: ccree: ssi_aead.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 27/27] Drivers: ccree: cc_crypto_ctx.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 26/27] Drivers: ccree: cc_hw_queue_defs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 25/27] Drivers: ccree: cc_regs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 24/27] Drivers: ccree: hash_defs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 21/27] Drivers: ccree: ssi_buffer_mgr.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 22/27] Drivers: ccree: ssi_aead.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 20/27] Drivers: ccree: ssi_buffer_mgr.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 19/27] Drivers: ccree: ssi_cipher.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 18/27] Drivers: ccree: ssi_config.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 17/27] Drivers: ccree: ssi_driver.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 16/27] Drivers: ccree: ssi_fips.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 15/27] Drivers: ccree: ssi_fips.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 14/27] Drivers: ccree: ssi_fips_data.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 13/27] Drivers: ccree: ssi_fips_ext.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 12/27] Drivers: ccree: ssi_fips_ll.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 11/27] Drivers: ccree: ssi_fips_local.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 10/27] Drivers: ccree: ssi_hash.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 09/27] Drivers: ccree: ssi_hash.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 08/27] Drivers: ccree: ssi_ivgen.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 07/27] Drivers: ccree: ssi_pm.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 06/27] Drivers: ccree: ssi_pm_ext.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 05/27] Drivers: ccree: ssi_pm_ext.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 04/27] Drivers: ccree: ssi_request_mgr.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 03/27] Drivers: ccree: ssi_request_mgr.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 02/27] Drivers: ccree: ssi_sysfs.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 01/27] Drivers: ccree: ssi_sysfs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH V2 00/27] Drivers: ccree - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH v2 06/12] crypto: sun4i-ss: simplify the pad length calculation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 12/12] ARM: sun5i: add a cryptographic engine node
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 07/12] crypto: sun4i-ss: simplify the appended bit assignment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/12] crypto: sun4i-ss: use GENMASK to generate masks
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 09/12] crypto: sun4i-ss: move from ablkcipher to skcipher API
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/12] crypto: sun4i-ss: add the CRYPTO_ALG_KERN_DRIVER_ONLY flag
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 11/12] crypto: sun4i-ss: fix large block size support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/12] ARM: sun5i: cryptographic engine support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/12] crypto: sun4i-ss: do not dynamically set parts of the last buffer to 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 04/12] crypto: sun4i-ss: cannot use DMA is the request is 0 length
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/12] crypto: sun4i-ss: use lower/upper_32_bits helpers
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/12] crypto: sun4i-ss: remove conditional checks against 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/12] crypto: sun4i-ss: group variable definitions in sun4i_hash()
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] staging: ccree: correct coding style violations
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] staging: ccree: correct coding style violations
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 04/12] staging: ccree: cleanup lli access macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] staging: ccree: move to kernel bitfields/bitops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] staging: ccree: correct coding style violations
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] staging: ccree: correct coding style violations
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 12/27] Drivers: ccree: ssi_fips_ll.c - align block comments
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/11] crypto: sun4i-ss: move from ablkcipher to skcipher API
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/11] crypto: sun4i-ss: move from ablkcipher to skcipher API
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 04/12] staging: ccree: cleanup lli access macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] staging: ccree: correct coding style violations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] staging: ccree: move to kernel bitfields/bitops
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/14] crypto: ecc - don't be selfish on pubkeys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2] X.509: Fix error code in x509_cert_parse()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 4/5] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/11] crypto: sun4i-ss: fix large block size support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 10/11] crypto: sun4i-ss: fix large block size support
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/11] crypto: introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 02/11] crypto: move algif to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 03/11] crypto: move pub key to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 04/11] crypto: move drbg to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 05/11] crypto: move gcm to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 06/11] crypto: move testmgr to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 08/11] fscrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 09/11] cifs: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 07/11] dm: move dm-verity to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: adapt api sample to use async. op wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 10/11] ima: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 00/11] introduce crypto wait for async op
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 10/11] crypto: sun4i-ss: fix large block size support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] crypto : stm32 - Add STM32F4 CRC32 support
- From: Fabien DESSENNE <fabien.dessenne@xxxxxx>
- Re: [RFC PATCH v2 4/4] crypto: testmgr - add genkey kpp test
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] crypto: dh - allow user to provide NULL privkey
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 04/14] crypto: ecc - don't be selfish on pubkeys
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 03/12] staging: ccree: remove 48 bit dma addr sim
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 02/12] staging: ccree: move to kernel bitfields/bitops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 04/12] staging: ccree: cleanup lli access macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 05/12] staging: ccree: remove cycle count debug support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 06/12] staging: ccree: move request_mgr to generic bitfield ops
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 07/12] staging: ccree remove custom bitfield macros
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 09/12] staging: ccree: use snake_case for hash enums
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 12/12] staging: ccree: whitespace fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 10/12] staging: ccree: drop no longer used macro
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 11/12] staging: ccree: remove dead code
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 08/12] staging: ccree: remove unused struct
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 01/12] staging: ccree: correct coding style violations
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 00/12] staging: ccree: addtional driver cleanups
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: may_use_simd on aarch64, chacha20
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: may_use_simd on aarch64, chacha20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next 3/4] tls: kernel TLS support
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH net-next 3/4] tls: kernel TLS support
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 10/11] crypto: sun4i-ss: fix large block size support
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH net-next 3/4] tls: kernel TLS support
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: mediatek - update DT binding documentation
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- Re: [RFC PATCH v2 4/4] crypto: testmgr - add genkey kpp test
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: may_use_simd on aarch64, chacha20
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: mediatek - update DT binding documentation
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 1/2] crypto: mediatek - remove redundant clock setting
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH] staging: ccree: fix cc_crypto_ctx.h white spaces
- From: Gennadii Altukhov <grinrag@xxxxxxxxx>
- encrypt_done called from interrupt context on rk3288 crypto driver
- From: Emil Karlson <jekarlson@xxxxxxxxx>
- Re: [PATCH net-next 0/4] kernel TLS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH net-next 2/4] tcp: export do_tcp_sendpages and tcp_rate_check_app_limited functions
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 1/1] crypto:drbg- Fixes panic in wait_for_completion call.
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH v4 14/14] crypto: pkcs1pad - comply with crypto_akcipher_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 13/14] crypto: qat - comply with crypto_akcipher_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 12/14] crypto: caampkc - comply with crypto_akcipher_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 11/14] crypto: rsa - comply with crypto_akcipher_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]