Linux Crypto
[Prev Page][Next Page]
- [PATCH v4 09/14] crypto: qat - comply with crypto_kpp_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 08/14] crypto: ecdh - comply with crypto_kpp_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 07/14] crypto: dh - comply with crypto_kpp_maxsize()
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 06/14] crypto: kpp: maxsize() - assume key is already set
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 05/14] crypto: dh - fix memleak in setkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 04/14] crypto: ecc - don't be selfish on pubkeys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 03/14] crypto: ecc - remove unnecessary casts
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 02/14] crypto: ecc - remove unused function arguments
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 01/14] crypto: kpp, (ec)dh - fix typos
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 00/14] fixes for kpp and akcipher
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 09/11] crypto: sun4i-ss: move from ablkcipher to skcipher API
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 00/11] ARM: sun5i: cryptographic engine support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/11] crypto: sun4i-ss: use GENMASK to generate masks
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/11] crypto: sun4i-ss: simplify the pad length calculation
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/11] crypto: sun4i-ss: simplify the appended bit assignment
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/11] crypto: sun4i-ss: do not dynamically set parts of the last buffer to 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/11] crypto: sun4i-ss: cannot use DMA is the request is 0 length
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/11] crypto: sun4i-ss: use lower/upper_32_bits helpers
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/11] crypto: sun4i-ss: remove conditional checks against 0
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/11] crypto: sun4i-ss: group variable definitions in sun4i_hash()
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 11/11] ARM: sun5i: add a cryptographic engine node
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/11] crypto: sun4i-ss: fix large block size support
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH net-next 4/4] tls: Documentation
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 3/4] tls: kernel TLS support
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 2/4] tcp: export do_tcp_sendpages and tcp_rate_check_app_limited functions
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 1/4] tcp: ULP infrastructure
- From: Dave Watson <davejwatson@xxxxxx>
- [PATCH net-next 0/4] kernel TLS
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH v6 2/5] arm64: marvell: dts: fix interrupts in 7k/8k crypto nodes
- From: Gregory CLEMENT <gregory.clement@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] arm64: marvell: add cryptographic engine support for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] arm64: marvell: dts: fix interrupts in 7k/8k crypto nodes
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] arm64: marvell: dts: add dma-mask in crypto nodes for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/11] crypto: KEYS: check err on akcipher maxsize
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH 01/27] Drivers: ccree: ssi_sysfs.h - align block comments
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [patch V3 07/32] padata: Avoid nested calls to cpus_read_lock() in pcrypt_init_padata()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch V3 06/32] padata: Make padata_alloc() static
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH 10/13] crypto: omap-aes: Add support for GCM mode
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 13/13] crypto: omap-sham: force word alignment on the xmit-buf also
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 12/13] crypto: omap-sham: fix closing of hash with separate finalize call
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 11/13] crypto: omap-sham: buffer handling fixes for hashing later
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 09/13] crypto: omap-aes: export some AES driver functionality locally
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 08/13] crypto: omap-aes: move definitions over to a separate header file
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 07/13] crypto: omap-aes: use base omap crypto support library
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 06/13] crypto: omap-des: use base omap crypto support library
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 05/13] crypto: omap: add base support library for common routines
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 04/13] crypto: omap-des - use runtime_pm autosuspend for clock handling
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 03/13] crypto: omap-des: add check for weak keys
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 02/13] crypto: omap-aes: fix context handling for multiple cores
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 00/13] crypto: omap fixes / changes for 4.13
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH 01/13] crypto: omap-aes: drop unused flags attribute from omap_aes_ctx
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 27/27] Drivers: ccree: cc_crypto_ctx.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 26/27] Drivers: ccree: cc_hw_queue_defs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 25/27] Drivers: ccree: cc_regs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 24/27] Drivers: ccree: hash_defs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 23/27] Drivers: ccree: ssi_aead.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 22/27] Drivers: ccree: ssi_aead.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 21/27] Drivers: ccree: ssi_buffer_mgr.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 20/27] Drivers: ccree: ssi_buffer_mgr.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 19/27] Drivers: ccree: ssi_cipher.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 18/27] Drivers: ccree: ssi_config.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 16/27] Drivers: ccree: ssi_fips.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 17/27] Drivers: ccree: ssi_driver.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 15/27] Drivers: ccree: ssi_fips.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 14/27] Drivers: ccree: ssi_fips_data.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 13/27] Drivers: ccree: ssi_fips_ext.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 12/27] Drivers: ccree: ssi_fips_ll.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 11/27] Drivers: ccree: ssi_fips_local.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 10/27] Drivers: ccree: ssi_hash.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 09/27] Drivers: ccree: ssi_hash.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 08/27] Drivers: ccree: ssi_ivgen.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 07/27] Drivers: ccree: ssi_pm.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 06/27] Drivers: ccree: ssi_pm_ext.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 05/27] Drivers: ccree: ssi_pm_ext.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 04/27] Drivers: ccree: ssi_request_mgr.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 03/27] Drivers: ccree: ssi_request_mgr.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 02/27] Drivers: ccree: ssi_sysfs.c - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 01/27] Drivers: ccree: ssi_sysfs.h - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- [PATCH 00/27] Drivers: ccree - align block comments
- From: Derek Robson <robsonde@xxxxxxxxx>
- Re: [PATCH v2 08/11] crypto: testmgr - check err on akcipher maxsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] drivers: staging: ccree: ISO C forbids casting to and from non-scalar
- From: Raphaël Beamonte <raphael.beamonte@xxxxxxxxx>
- Re: [PATCH] X.509: Fix error code in x509_cert_parse()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: engine - replace pr_xxx by dev_xxx
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v8 0/2] crypto: AF_ALG memory management fix
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v8 2/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v8 1/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] X.509: Fix error code in x509_cert_parse()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v1 1/2] dt-bindings: timeriomem_rng: Add entropy quality property
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v3 08/11] crypto: testmgr - check err on akcipher maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 11/11] crypto: dh - fix memleak in setkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 10/11] crypto: ecc - don't be selfish on pubkeys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 09/11] crypto: KEYS: check err on akcipher maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 06/11] crypto: rsa - change err code in rsa_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 03/11] crypto: ecc - remove unnecessary casts
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 07/11] crypto: testmgr - check err on kpp maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 05/11] crypto: ecdh - fix ecdh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 04/11] crypto: dh - fix dh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 02/11] crypto: ecc - remove unused function arguments
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 00/11] fixes for ecc, ec(dh), rsa & testmgr
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v3 01/11] crypto: kpp, (ec)dh - fix typos
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: engine - Permit to enqueue skcipher request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] crypto: engine - replace pr_xxx by dev_xxx
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v2 08/11] crypto: testmgr - check err on akcipher maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: ecdh: generation and retention of ecc privkey in kernel/hardware
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] crypto: add HMAC IPAD/OPAD constant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: async crypto op fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat: use pcie_flr instead of duplicating it
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: img-hash - Handle return value of clk_prepare_enable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] hw_random : omap3-rom-rng:- Handle return value of clk_prepare_enable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 08/11] crypto: testmgr - check err on akcipher maxsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/11] crypto: dh - fix dh_max_size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: dh - fix dh_max_size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ecdh: generation and retention of ecc privkey in kernel/hardware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: stm32 - Add CRC32 support for STM32F4XX
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] crypto: rng: Remove unused function __crypto_rng_cast()
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- [PATCH v2 2/2] hw_random: timeriomem_rng: Allow setting RNG quality from platform data
- From: Rick Altherr <raltherr@xxxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: timeriomem_rng: Add entropy quality property
- From: Rick Altherr <raltherr@xxxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH v5 1/4] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/4] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] arm64: marvell: dts: add dma-mask in crypto nodes for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/4] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/4] arm64: marvell: add cryptographic engine support for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH v3 1/5] dt-bindings : Document the STM32F4 CRC32 binding
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH v3 0/5] Add support for the STM32F4 CRC32
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: may_use_simd on aarch64, chacha20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- may_use_simd on aarch64, chacha20
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: DEADLOCK: bisected to d215aab82d81974f438bfbc80aa437132f3c37c3 ("cpu/hotplug: Convert hotplug locking to percpu rwsem")
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- DEADLOCK: bisected to d215aab82d81974f438bfbc80aa437132f3c37c3 ("cpu/hotplug: Convert hotplug locking to percpu rwsem")
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] staging: ccree: add CRYPTO dependency
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 5/5] crypto: arm/crc32 - enable module autoloading based on CPU feature bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] crypto: arm/sha2-ce - enable module autoloading based on CPU feature bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm/sha1-ce - enable module autoloading based on CPU feature bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] crypto: arm/ghash-ce - enable module autoloading based on CPU feature bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/5] crypto: arm/aes-ce - enable module autoloading based on CPU feature bits
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] crypto: arm - enable module autoloading
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH] crypto: exynoes-rng: Set cra_ctxsize to 0
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 2/5] dt-bindings : Document the STM32F4 CRC32 binding
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH v2 1/5] crypto : stm32 - Add STM32F4 CRC32 support
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH v2 0/5] Add support for the STM32F4 CRC32
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- Re: [PATCH v2 9/9] crypto: ccp - Use IPAD/OPAD constant
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 4/9] crypto: marvell - Use IPAD/OPAD constant
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/9] crypto: mediatek - Use IPAD/OPAD constant
- From: Matthias Brugger <matthias.bgg@xxxxxxxxx>
- [PATCH] staging: ccree: add CRYPTO dependency
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 3/9] crypto: ixp4xx - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 4/9] crypto: marvell - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/9] crypto: add HMAC IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 5/9] crypto: mv_cesa - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 6/9] crypto: omap-sham - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 7/9] crypto: qat - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 9/9] crypto: ccp - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 8/9] crypto: mediatek - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/9] crypto: brcm - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 1/9] crypto: add hmac IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH 00/31] Standardize doc formats - part 1
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH 25/31] hw_random.txt: standardize document format
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH 00/30] Standardize doc formats - part 2
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH 26/30] padata.txt: standardize document format
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH] staging: ccree: fix checkpatch no space before tabs
- From: Branislav Katreniak <brano@xxxxxx>
- [PATCH v2 3/4] crypto: gcm wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/4] crypto: handle EBUSY due to backlog correctly
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: drbg wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: Documentation: fix none signal safe sample
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: async crypto op fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: dm-crypt IV generation (summary)
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: handle EBUSY due to backlog correctly
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: drbg wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/4] crypto: async crypto op fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: Documentation: fix none signal safe sample
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: gcm wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] hw_random: timeriomem_rng: Allow setting RNG quality from platform data
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 0/7] crypto: aesni: provide generic gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - avoid non-standard inline asm tricks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Add a module author
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512-mb - add some missing unlock on error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: caampkc - extend RSA private key representation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: don't disable irqs and wait
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg wait for crypto op not signal safe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] crypto: add hmac IPAD/OPAD constant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Fix a handful of minor bugs spotted by eye
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] crypto: tcrypt - include rsa test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Fix a handful of minor bugs spotted by eye
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Fix a handful of minor bugs spotted by eye
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x: Fix a handful of minor bugs spotted by eye
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/2] hw_random: timeriomem_rng: Allow setting RNG quality from platform data
- From: Rick Altherr <raltherr@xxxxxxxxxx>
- [PATCH v1 1/2] dt-bindings: timeriomem_rng: Add entropy quality property
- From: Rick Altherr <raltherr@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v4 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - avoid non-standard inline asm tricks
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- [RFC PATCH v2 4/4] crypto: testmgr - add genkey kpp test
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH v2 3/4] crypto: dh - allow user to provide NULL privkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/4] crypto: ecdh - allow user to provide NULL privkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/4] crypto: ecc - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/4] crypto: (ec)dh - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 11/11] crypto: rsa - do checks before allocating data
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 10/11] crypto: KEYS: check err on akcipher maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 09/11] crypto: testmgr - check err on kpp maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 08/11] crypto: testmgr - check err on akcipher maxsize
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 07/11] crypto: dh - fix memleak in setkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 06/11] crypto: ecc - don't be selfish on pubkeys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 05/11] crypto: ecdh - fix ecdh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 04/11] crypto: dh - fix dh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 02/11] crypto: ecc - remove unused function arguments
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 00/11] fixes for ecc, ec(dh), rsa & testmgr
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 03/11] crypto: ecc - remove unnecessary casts
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v2 01/11] crypto: kpp, (ec)dh - fix typos
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 4/4] crypto: testmgr - add genkey kpp test
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 2/4] crypto: ecdh - allow user to provide NULL privkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 3/4] crypto: dh - allow user to provide NULL privkey
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 1/4] crypto: ecc - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [RFC PATCH 0/4] crypto: (ec)dh - add privkey generation support
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH] crypto: x86/aes - Don't use %rbp as temporary register
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: Documentation: fix none signal safe sample
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg wait for crypto op not signal safe
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] crypto: stm32 - Add CRC32 support for STM32F4XX
- From: Cosar Dindar <cosardindar@xxxxxxxxx>
- [PATCH] crypto: qat: use pcie_flr instead of duplicating it
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v2 13/53] docs-rst: add crypto API book to pdf output
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH] drivers/staging/ccree: Replacing spaces by tab
- From: Pushkar Jambhlekar <pushkar.iit@xxxxxxxxx>
- [PATCH v1] crypto: img-hash - Handle return value of clk_prepare_enable
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- Re: [PATCH] drivers/staging/ccree: Fixing coding guideline errors
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] drivers/staging/ccree: Fixing coding guideline errors
- From: Pushkar Jambhlekar <pushkar.iit@xxxxxxxxx>
- Re: [PATCH v8 0/4] Broadcom SBA RAID support
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: scomp - add support for deflate rfc1950 (zlib)
- From: abed mohammad kamaluddin <abedamu@xxxxxxxxx>
- Re: [PATCH v11 4/5] LRNG - enable compile (fwd)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] fix ptr_ret.cocci warnings
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 4/5] LRNG - enable compile (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] fix ptr_ret.cocci warnings
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH v1] hw_random : omap3-rom-rng:- Handle return value of clk_prepare_enable
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- [PATCH v8 4/4] dt-bindings: Add DT bindings document for Broadcom SBA RAID driver
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH v8 2/4] async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome()
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH v8 3/4] dmaengine: Add Broadcom SBA RAID driver
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH v8 1/4] lib/raid6: Add log-of-2 table for RAID6 HW requiring disk position
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH v8 0/4] Broadcom SBA RAID support
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH v11 3/5] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 2/5] random: conditionally compile code depending on LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 1/5] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 0/5] /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 4/5] LRNG - enable compile
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v11 5/5] LRNG - add ChaCha20 support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: algapi: Use pr_err common logging style.
- From: Karim Eshapa <karim.eshapa@xxxxxxxxx>
- [PATCH] Documentation: crypto: Fixed bugs, added example usage of calc_hash().
- From: Kamil Konieczny <k.konieczny@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/36] docs-rst: add crypto API book to pdf output
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
- [PATCH 8/8] crypto: ecc - don't be selfish on pubkeys
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 7/8] crypto: ecdh - fix ecdh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 6/8] crypto: dh - fix dh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 5/8] crypto: ecc - remove casts in ecc_is_key_valid
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 4/8] crypto: ecc - remove casts in crypto_ecdh_shared_secret
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/8] crypto: ecc - remove casts in ecdh_make_pub_key
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/8] crypto: ecc - remove unused function arguments
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/8] crypto: kpp, (ec)dh - fix typos
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/8] cleanning and fixes for ecc, (ec)dh
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] clean some ecc functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: dh - fix dh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- Re: [PATCH] hwrng: do not warn when there are no devices
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] hwrng: do not warn when there are no devices
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- [PATCH] crypto-testmgr: Delete an error message for a failed memory allocation in two functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: srikanth jampala <jsrikanth@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: srikanth jampala <jsrikanth@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: drbg wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: Documentation: fix none signal safe sample
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: gcm wait for crypto op not signal safe
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: handle EBUSY due to backlog correctly
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 0/4] crypto: async crypto op fixes
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC 01/10] crypto: factor async completion for general use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC 01/10] crypto: factor async completion for general use
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC 01/10] crypto: factor async completion for general use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
- From: Neeraj Soni <neersoni@xxxxxxxxxxxxxx>
- Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
- From: Neeraj Soni <neersoni@xxxxxxxxxxxxxx>
- Re: [RFC 07/10] fscrypt: move to generic async completion
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC 01/10] crypto: factor async completion for general use
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [RFC 09/10] ima: move to generic async completion
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- need to pick a solution for dm-crypt IV generation and do it! [was: Re: dm: submit stacked requests in irq enabled context]
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 1/3] crypto: cavium - Add support for CNN55XX adapters.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v1 3/3] crypto: cavium - Register the CNN55XX supported crypto algorithms.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v1 2/3] crypto: cavium - Add debugfs support in CNN55XX driver
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v1 1/3] crypto: cavium - Add support for CNN55XX adapters.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH v1 0/3] Add support for Cavium CNN55XX crypto adapters.
- From: Srikanth Jampala <Jampala.Srikanth@xxxxxxxxxx>
- [PATCH] crypto: glue_helper: remove redundant check on nbytes < bsize
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: ecdh - fix ecdh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: dh - fix dh_max_size
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: ecc - remove unused function arguments
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 3/4] crypto: ecc - remove casts in crypto_ecdh_shared_secret
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 0/4] clean some ecc functions
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: ecc - remove casts in ecc_is_key_valid
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: ecc - remove casts in ecdh_make_pub_key
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: aes_ti - fix comment for MixColumns step
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: glue_helper - Delete some dead code
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: aes_ti - fix comment for MixColumns step
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: crypto: al_alg: alg_setkey does not check key's size is zero or not, causing a Null-ptr-dereference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rng - move __crypto_rng_cast to the rng header
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC 08/10] cifs: move to generic async completion
- From: Pavel Shilovsky <pshilovsky@xxxxxxxxx>
- Re: BUG: drbg: Added nodes from Stack Memory in link list
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- RE: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Igal Liberman <igall@xxxxxxxxxxx>
- Re: BUG: drbg: Added nodes from Stack Memory in link list
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: BUG: drbg: Added nodes from Stack Memory in link list
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] staging: MAINTAINERS: add GBY as ccree maintainer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: mediatek - drop .owner field in mtk_crypto_driver
- From: Geliang Tang <geliangtang@xxxxxxxxx>
- [RFC 06/10] dm: move dm-verity to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 07/10] fscrypt: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 09/10] ima: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 08/10] cifs: move to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 10/10] crypto: adapt api sample to use async. op wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 05/10] crypto: move testmgr to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 04/10] crypto: move gcm to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 02/10] crypto: move pub key to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 03/10] crypto: move drbg to generic async completion
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 01/10] crypto: factor async completion for general use
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [RFC 00/10] introduce crypto wait for async op function
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx: Remove dubiously licensed crypto code
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx: Remove dubiously licensed crypto code
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v2 01/14] crypto: sun4i-ss - simplify optional reset handling
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 3/3] crypto: cavium: Add more algorithms
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: cavium: Remove the individual encrypt/decrypt function for each algorithm
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: cavium: Downgrade the annoying misc interrupt print from dev_err to dev_dbg
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v2 0/3] Add more algorithms and some misc cleanups
- From: George Cherian <george.cherian@xxxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: BUG: drbg: Added nodes from Stack Memory in link list
- From: Stephan Müller <smueller@xxxxxxxxxx>
- BUG: drbg: Added nodes from Stack Memory in link list
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [PATCH] crypto: kpp, (ec)dh - fix typos
- From: Tudor-Dan Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] Broadcom SBA RAID support
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- Re: [PATCH v6 0/4] Broadcom SBA RAID support
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- [PATCH] drivers/crypto/ccp: return NULL instead of 0
- From: Pushkar Jambhlekar <pushkar.iit@xxxxxxxxx>
- Re: [PATCH v6 0/4] Broadcom SBA RAID support
- From: Anup Patel <anup.patel@xxxxxxxxxxxx>
- [PATCH V2] crypto: ccp - Add debugfs entries for CCP information
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [Swan] IPsec PFP support on linux
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v2] crypto: talitos: Extend max key length for SHA384/512-HMAC and AEAD
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [bug] sha1-avx2 and read beyond
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- [PATCH v2] crypto: talitos: Extend max key length for SHA384/512-HMAC and AEAD
- From: Martin Hicks <mort@xxxxxxxx>
- IPsec PFP support on linux
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ecdh: generation and retention of ecc privkey in kernel/hardware
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/5] KEYS: fixes for new keyctl_dh_compute() KDF extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: crypto_memneq not backported to 3.10
- From: Willy Tarreau <w@xxxxxx>
- Re: crypto_memneq not backported to 3.10
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Crypto Update for 4.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug] sha1-avx2 and read beyond
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH] crypto: stm32 - fix building as a module
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: stm32 - Fix OF module alias information
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hifn_795x: Fix a handful of minor bugs spotted by eye
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 1/7] crypto: aesni: make non-AVX AES-GCM work with any aadlen
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 2/7] crypto: aesni: make non-AVX AES-GCM work with all valid auth_tag_len
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 4/7] crypto: aesni: make AVX AES-GCM work with all valid auth_tag_len
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 6/7] crypto: aesni: make AVX2 AES-GCM work with all valid auth_tag_len
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 3/7] crypto: aesni: make AVX AES-GCM work with any aadlen
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: aesni: add generic gcm(aes)
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 5/7] crypto: aesni: make AVX2 AES-GCM work with any aadlen
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- [PATCH 0/7] crypto: aesni: provide generic gcm(aes)
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] KEYS: fixes for new keyctl_dh_compute() KDF extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/5] KEYS: fixes for new keyctl_dh_compute() KDF extension
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: talitos: Extend max key length for SHA384/512-HMAC
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: ecdh: generation and retention of ecc privkey in kernel/hardware
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH] crypto: talitos: Extend max key length for SHA384/512-HMAC
- From: Martin Hicks <mort@xxxxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: David Howells <dhowells@xxxxxxxxxx>
- ecdh: generation and retention of ecc privkey in kernel/hardware
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH v4 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/3] arm64: marvell: add cryptographic engine support for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] random: remove unused branch in hot code path
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] crypto: stm32 - fix building as a module
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Jeff Kirsher <jeffrey.t.kirsher@xxxxxxxxx>
- Re: [PATCH 4/7] ixgbe: use pcie_flr instead of duplicating it
- From: Jeff Kirsher <jeffrey.t.kirsher@xxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha - avoid non-standard inline asm tricks
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- [PATCH] crypto: arm64/sha - avoid non-standard inline asm tricks
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: ccp - Add debugfs entries for CCP information
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: don't disable irqs and wait
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v2 02/21] libiscsi: Add an internal error code
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- [PATCH v2 16/21] mmc: sdhci: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 18/21] mmc: tmio: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 03/21] libiscsi: Make use of new the sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 00/21] Introduce common scatterlist map function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 14/21] scsi: libfc, csiostor: Change to sg_copy_buffer in two drivers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 07/21] crypto: shash, caam: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 04/21] target: Make use of the new sg_map function at 16 call sites
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 11/21] scsi: ipr, pmcraid, isci: Make use of the new sg_map helper
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 21/21] memstick: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 17/21] mmc: spi: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 09/21] staging: unisys: visorbus: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 06/21] crypto: hifn_795x: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 13/21] scsi: arcmsr, ips, megaraid: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 10/21] RDS: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 12/21] scsi: hisi_sas, mvsas, gdth: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 15/21] xen-blkfront: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 19/21] mmc: sdricoh_cs: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 20/21] mmc: tifm_sd: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 01/21] scatterlist: Introduce sg_map helper functions
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 05/21] drm/i915: Make use of the new sg_map helper function
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 08/21] dm-crypt: Make use of the new sg_map helper in 4 call sites
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v2 02/21] libiscsi: Add an internal error code
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH] crypto: sha512-mb - add some missing unlock on error
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Doug Ledford <dledford@xxxxxxxxxx>
- [PATCH -next] crypto: stm32 - Fix OF module alias information
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- [PATCH] crypto: ccp - Add a module author
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 4/5] crypto: caampkc - add support for RSA key form 2
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/5] crypto: caampkc - incapsulate dropping leading zeros into function
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 5/5] crypto: cammpkc - add support for RSA key form 3
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/5] crypto: caampkc - avoid kzalloc(0) in caam_read_raw_data
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/5] crypto: tcrypt - include rsa test
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/5] crypto: caampkc - extend RSA private key representation
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] crypto: sha512-mb - add some missing unlock on error
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_aead - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: tcrypt: don't disable irqs and wait
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] liquidio: use pcie_flr instead of duplicating it
- From: Felix Manlunas <felix.manlunas@xxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Dennis Dalessandro <dennis.dalessandro@xxxxxxxxx>
- Re: [PATCH 3/6] ima: Simplify policy_func_show.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/9] crypto: brcm - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/9] crypto: marvell - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 8/9] crypto: mediatek - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 9/9] crypto: ccp - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 5/9] crypto: mv_cesa - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 6/9] crypto: omap-sham - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/9] crypto: ixp4xx - Use IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/9] crypto: add hmac IPAD/OPAD constant
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- RE: [PATCH 5/7] IB/hfi1: use pcie_flr instead of duplicating it
- From: "Byczkowski, Jakub" <jakub.byczkowski@xxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] crypto: cavium: Remove the individual encrypt/decrypt function for each algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: scomp - allow registration of multiple scomps
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crypto4xx: rename ce_ring_contol to ce_ring_control
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_aead - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Change CCP ISR handler model
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Igal Liberman <igall@xxxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: arm64/sha: Add constant operand modifier to ASM_EXPORT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] arm64: marvell: add cryptographic engine support for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: ecc : Wipe memory for p on errors.
- From: Loganaden Velvindron <logan@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: Zero iv before freeing it
- From: Codarren Velvindron <codarren@xxxxxxxxxx>
- Re: [PATCH] crypto: ecc : Wipe memory for p on errors.
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt: Zero iv before freeing it
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: clean up memory for sensitive information
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: tcrypt: Zero iv before freeing it
- From: Codarren Velvindron <codarren@xxxxxxxxxx>
- [PATCH]crypto:asymmetric_keys:verify_pefile:zero memory content before freeing
- From: Yasir Auleear <yasirmx@xxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 11/15] staging: ccree: fix platform_no_drv_owner.cocci warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 09/15] MAINTAINERS: add Gilad BY as ccree maintainer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 12/15] staging: ccree: fix semicolon.cocci warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 10/15] staging: ccree: remove useless NULL test of field
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 13/15] staging: ccree: fix array_size.cocci warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 14/15] staging: ccree: fix ifnullfree.cocci warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 15/15] staging: ccree: fix ifnullfree.cocci warnings
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 08/15] staging: ccree: add DT bindings for Arm CryptoCell
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 07/15] staging: ccree: add TODO list
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 06/15] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 04/15] staging: ccree: add IV generation support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 05/15] staging: ccree: add AEAD support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 03/15] staging: ccree: add skcipher support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 02/15] staging: ccree: add ahash support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 01/15] staging: ccree: introduce CryptoCell HW driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v3 00/15] staging: ccree: add Arm TrustZone CryptoCell REE driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr: clean up memory for sensitive information
- From: Pirabarlen-Cheenaramen <selven@xxxxxxxxxx>
- [PATCH] crypto: ecc : Wipe memory for p on errors.
- From: Loganaden Velvindron <logan@xxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [padata] bbd8797975: WARNING: CPU: 0 PID: 1 at kernel/cpu.c:258 put_online_cpus
- From: kernel test robot <fengguang.wu@xxxxxxxxx>
- [PATCH v2 2/2] crypto: scomp - add support for deflate rfc1950 (zlib)
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 1/2] crypto: scomp - allow registration of multiple scomps
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC PATCH v1 1/1] crypto: algif_compression - User-space interface for compression
- From: abed mohammad kamaluddin <abedamu@xxxxxxxxx>
- Re: [RFC PATCH v1 1/1] crypto: algif_compression - User-space interface for compression
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Combine substrings for two messages in n2rng_probe()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Combine substrings for two messages in n2rng_probe()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] crypto: algif_compression - User-space interface for compression
- From: abed mohammad kamaluddin <abedamu@xxxxxxxxx>
- [PATCH 1/2] crypto: ccp - Change ISR handler method for a v3 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/2] Change CCP ISR handler model
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/2] crypto: ccp - Change ISR handler method for a v5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH v3 13/29] x86: crypto, annotate local functions
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v3 26/29] x86_64: assembly, change all ENTRY to SYM_FUNC_START
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v3 15/29] x86: assembly, annotate aliases
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH v3 27/29] x86_32: assembly, change all ENTRY to SYM_FUNC_START
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH 3/6] ima: Simplify policy_func_show.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] n2rng: Use devm_kcalloc() in n2rng_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] hwrng: mtk: add support for hardware random generator on MT7623 SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] crypto: hw_random - Add new Exynos RNG driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 0/2] Interrupt management fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] powerpc/crypto/crct10dif-vpmsum: Fix missing preempt_disable()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: acomp - replace compression known answer test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: acomp - allow registration of multiple acomps
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: chcr - Fix error handling related to 'chcr_alloc_shash'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: caam - fix error return code in caam_qi_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Bug fixes and fallback for AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: acomp - add support for deflate rfc1950 (zlib)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: acomp - report scomp implementations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Combine substrings for two messages in n2rng_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: crypto4xx: rename ce_ring_contol to ce_ring_control
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_aead - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: Allow ecb(cipher_null) in FIPS mode
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [cpu/hotplug] d215aab82d: [ INFO: possible circular locking dependency detected ]
- From: kernel test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Makefile, LLVM: add -no-integrated-as to KBUILD_[AC]FLAGS
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/3] crypto: cavium: Downgrade the annoying misc interrupt print from dev_err to dev_dbg
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH 3/3] crypto: cavium: Add more algorithms
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH 2/3] crypto: cavium: Remove the individual encrypt/decrypt function for each algorithm
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH 0/3] Add more algorithms and some misc cleanups
- From: George Cherian <george.cherian@xxxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [Patch V5 7/7] crypto: AES CBC multi-buffer tcrypt
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [Patch V5 7/7] crypto: AES CBC multi-buffer tcrypt
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] crypto: ccp - Use only the relevant interrupt bits
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 5/6] MODSIGN: Export module signature definitions.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [Patch V5 1/7] crypto: Multi-buffer encryption infrastructure support
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 3/7] crypto: AES CBC multi-buffer scheduler
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 5/7] crypto: AES CBC multi-buffer glue code
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 6/7] crypto: AES vectors for AES CBC multibuffer testing
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 2/7] crypto: AES CBC multi-buffer data structures
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 7/7] crypto: AES CBC multi-buffer tcrypt
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima: Simplify policy_func_show.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [Patch V5 4/7] crypto: AES CBC by8 encryption
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [Patch V5 0/7] crypto: AES CBC multibuffer implementation
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH V3 2/2] crypto: ccp - Disable interrupts early on unload
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH V3 1/2] crypto: ccp - Use only the relevant interrupt bits
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH V3 0/2] Interrupt management fixes
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH V3 1/2] crypto: ccp - Use only the relevant interrupt bits
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 5/9] staging: ccree: add AEAD support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] staging: ccree: fix ifnullfree.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/9] staging: ccree: add ahash support
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH] staging: ccree: fix semicolon.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] staging: ccree: fix ifnullfree.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] staging: ccree: fix platform_no_drv_owner.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] staging: ccree: fix array_size.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 2/2] hwrng: mtk: Add driver for hardware random generator on MT7623 SoC
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: hwrng: Add Mediatek hardware random generator bindings
- From: <sean.wang@xxxxxxxxxxxx>
- [PATCH v2 0/2] hwrng: mtk: add support for hardware random generator on MT7623 SoC
- From: <sean.wang@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/1] *** crypto: AF_ALG: add compression support ***
- From: abed mohammad kamaluddin <abedamu@xxxxxxxxx>
- Re: [PATCH 5/6] MODSIGN: Export module signature definitions.
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/9] staging: ccree: add Arm TrustZone CryptoCell REE driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] staging: ccree: add Arm TrustZone CryptoCell REE driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v2 2/9] staging: ccree: add ahash support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 3/9] staging: ccree: add skcipher support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 9/9] MAINTAINERS: add Gilad BY as ccree maintainer
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 5/9] staging: ccree: add AEAD support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 6/9] staging: ccree: add FIPS support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 4/9] staging: ccree: add IV generation support
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 7/9] staging: ccree: add TODO list
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 8/9] staging: ccree: add DT bindings for Arm CryptoCell
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 1/9] staging: ccree: introduce CryptoCell HW driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 0/9] staging: ccree: add Arm TrustZone CryptoCell REE driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] MODSIGN: Export module signature definitions.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima: Simplify policy_func_show.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/1] *** crypto: AF_ALG: add compression support ***
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] crypto: KPP - add API crypto_kpp_set_params
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/1] *** crypto: AF_ALG: add compression support ***
- From: abed mohammad kamaluddin <abedamu@xxxxxxxxx>
- [PATCH 2/5] KEYS: DH: don't feed uninitialized "otherinfo" into KDF
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 3/5] KEYS: DH: don't feed uninitialized result memory into KDF
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 4/5] KEYS: DH: ensure the KDF counter is properly aligned
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 5/5] KEYS: DH: add __user annotations to keyctl_kdf_params
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 1/5] KEYS: DH: forbid using digest_null as the KDF hash
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH 0/5] KEYS: fixes for new keyctl_dh_compute() KDF extension
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2] powerpc/crypto/crct10dif-vpmsum: Fix missing preempt_disable()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] ima: Support appended signatures for appraisal
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: hwrng: Add Mediatek hardware random generator bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: export pcie_flr and remove copies of it in drivers V2
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Combine substrings for two messages in n2rng_probe()
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- Re: [PATCH 1/2] n2rng: Use devm_kcalloc() in n2rng_probe()
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- RE: [PATCH 4/8] crypto: KPP - add API crypto_kpp_set_params
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 0/4] staging: add ccree crypto driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] staging: add ccree crypto driver
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH 2/2] crypto: acomp - add support for deflate rfc1950 (zlib)
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/2] crypto: scomp - allow registration of multiple scomps
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: acomp - replace compression known answer test
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: acomp - report scomp implementations
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] crypto: acomp - allow registration of multiple acomps
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC PATCH 0/8] crypto: AF_ALG support for KPP
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 0/8] crypto: AF_ALG support for KPP
- From: Tudor Ambarus <tudor.ambarus@xxxxxxxxxxxxx>
- [PATCH 2/2] n2rng: Combine substrings for two messages in n2rng_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] n2rng: Use devm_kcalloc() in n2rng_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] n2rng: Fine-tuning for n2rng_probe()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: inside-secure: add SafeXcel EIP197 crypto engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] Documentation/bindings: Document the SafeXel cryptographic engine driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] MAINTAINERS: add a maintainer for the Inside Secure crypto driver
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] arm64: marvell: add cryptographic engine support for 7k/8k
- From: Antoine Tenart <antoine.tenart@xxxxxxxxxxxxxxxxxx>
- Re: export pcie_flr and remove copies of it in drivers V2
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- padata & workqueue list corruption
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH 8/8] crypto: AF_ALG - add KPP support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 5/8] crypto: DH - allow params and key to be set independently
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH 0/8] crypto: AF_ALG support for KPP
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 7/8] crypto: ecdh - constify key
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 6/8] crypto: DH - add PKCS#3 parameter handling
- From: Stephan Müller <smueller@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]