Linux Crypto
[Prev Page][Next Page]
- [PATCH 4/4] crypto: ccp - Simplify some buffer management routines
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 3/4] crypto: ccp - Update the command queue on errors
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/4] crypto: ccp - Set the start-of-command bit
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 1/4] crypto: ccp - Change mode for detailed CCP init messages
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 0/4] Minor CCP driver improvements and clean-up
- From: Gary R Hook <gary.hook@xxxxxxx>
- [RFC PATCH] crypto: algapi - make crypto_xor() and crypto_inc() alignment agnostic
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v5 3/3] drivers: crypto: Enable CPT options crypto for build
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v5 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v5 1/3] drivers: crypto: Add Support for Octeon-tx CPT Engine
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v5 0/3] Add Support for Cavium Cryptographic Acceleration Unit
- From: George Cherian <george.cherian@xxxxxxxxxx>
- Re: [PATCH] dm: switch dm-verity to async hash crypto API
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: 4.10 aesni-intel no longer having lrw/ablk_helper dependencies?
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- 4.10 aesni-intel no longer having lrw/ablk_helper dependencies?
- From: Arkadiusz Miskiewicz <a.miskiewicz@xxxxxxxxx>
- Re: [PATCH] dm: switch dm-verity to async hash crypto API
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: ccm - switch to separate cbcmac driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH v2 4/4] crypto: aes - add generic time invariant AES for CTR/CCM/GCM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/4] crypto: arm64/aes - add NEON and Crypto Extension CBC-MAC driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: testmgr - add test cases for cbcmac(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/4] crypto: time invariant AES for CCM (and GCM/CTR)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 09/10] crypto: arm64/aes-neon-blk - tweak performance for low end cores
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 10/10] crypto: arm64/aes - replace scalar fallback with plain NEON fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 04/10] crypto: arm64/aes-ce-ccm - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 05/10] crypto: arm64/aes-blk - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 08/10] crypto: arm64/aes - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 06/10] crypto: arm64/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 07/10] crypto: arm64/aes - avoid literals for cross-module symbol references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 03/10] crypto: arm/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 02/10] crypto: arm/aes-ce - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 01/10] crypto: arm64/aes-neon-bs - honour iv_out requirement in CTR mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 00/10] crypto - AES for ARM/arm64 updates for v4.11 (round #2)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH -stable] crypto: ccm - deal with CTR ciphers that honour iv_out
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: ccp: Fix double add when creating new DMA command
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH v6 4/5] fs/pstore: fs/squashfs: Change usage of LZ4 to work with new LZ4 version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] lib/lz4: Remove back-compat wrappers
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] crypto: Change LZ4 modules to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp: Fix DMA operations when IOMMU is enabled
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto: arm64/crc32 - detect crc32 support in assembler
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] crypto: arm64/crc32 - detect crc32 support in assembler
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/8] crypto:chcr- Use cipher instead of Block Cipher in gcm setkey
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 1/8] crypto:chcr-Change flow IDs
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 3/8] crypto:chcr-fix itnull.cocci warnings
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 8/8] crypto:chcr-Fix Smatch Complaint
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 7/8] crypto:chcr- Fix wrong typecasting
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 2/8] crypto:chcr- Fix key length for RFC4106
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 0/8] Bug fixes
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 6/8] crypto:chcr- Change algo priority
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH 5/8] crypto:chcr: Change cra_flags for cipher algos
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH] crypto: camellia: add missing declarations
- From: Nicholas Mc Guire <der.herr@xxxxxxx>
- Re: [PATCH 2/4] crypto: ccm - switch to separate cbcmac driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: aes - add generic time invariant AES for CTR/CCM/GCM
- From: Krzysztof Kwiatkowski <kris@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: aes - add generic time invariant AES for CTR/CCM/GCM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [RFC PATCH 4/4] crypto: aes - add generic time invariant AES for CTR/CCM/GCM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/4] crypto: arm64/aes - add NEON and Crypto Extension CBC-MAC driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/4] crypto: ccm - switch to separate cbcmac driver
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/4] crypto: testmgr - add test cases for cbcmac(aes)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/4] crypto: time invariant AES for CCM (and GCM/CTR)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 08/12] crypto: atmel-sha: add simple DMA transfers
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 02/12] crypto: atmel-sha: update request queue management to make it more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 10/12] crypto: atmel-aes: fix atmel_aes_handle_queue()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 09/12] crypto: atmel-sha: add support to hmac(shaX)
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 12/12] crypto: atmel-sha: add verbose debug facilities to print hw register names
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 01/12] crypto: atmel-sha: create function to get an Atmel SHA device
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 04/12] crypto: atmel-sha: redefine SHA_FLAGS_SHA* flags to match SHA_MR_ALGO_SHA*
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 05/12] crypto: atmel-sha: add atmel_sha_wait_for_data_ready()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 06/12] crypto: atmel-sha: add SHA_MR_MODE_IDATAR0
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 07/12] crypto: atmel-sha: add atmel_sha_cpu_start()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 03/12] crypto: atmel-sha: make atmel_sha_done_task more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v3 00/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH] crypto: doc - Fix hash export state information
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- [PATCHv2] crypto: doc - Fix hash export state information
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH v5 0/5] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dm: switch dm-verity to async hash crypto API
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- Re: [PATCH v5 0/5] Update LZ4 compressor module
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v5 2/5] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] lib/lz4: Remove back-compat wrappers
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] fs/pstore: fs/squashfs: Change usage of LZ4 to work with new LZ4 version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] crypto: Change LZ4 modules to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add support for ECDSA algorithm
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/6] Add support for ECDSA algorithm
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- Re: [PATCH 5/6] crypto: testmgr: add ECDSA tests
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- Re: [PATCH 4/6] crypto: ecdsa: add ECDSA SW implementation
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: fix %progbits -> @progbits
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH v3 1/3] crypto: brcm: DT documentation for Broadcom SPU hardware
- From: Rob Rice <rob.rice@xxxxxxxxxxxx>
- [PATCH v3 3/3] arm64: dts: ns2: Add Broadcom SPU driver DT entry.
- From: Rob Rice <rob.rice@xxxxxxxxxxxx>
- [PATCH v3 0/3] Add Broadcom SPU Crypto Driver
- From: Rob Rice <rob.rice@xxxxxxxxxxxx>
- Re: [PATCH] crypto: doc - Fix hash export state information
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: doc - Fix hash export state information
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH v4 1/4] lib: Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] dm: switch dm-verity to async hash crypto API
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [bug report] crypto: chcr - Add AEAD algos.
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH v2 1/2] crypto:chcr- Fix panic on dma_unmap_sg
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 0/2 ] Bug Fixes for 4.10
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v2 2/2] crypto:chcr- Check device is allocated before use
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH v4 1/4] lib: Update LZ4 compressor module
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] crypto: vmx -- disable preemption to enable vsx in aes_ctr.c
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: make constants readonly, allow linker to merge them
- From: Denys Vlasenko <dvlasenk@xxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - Add mode to test specified algs
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH] crypto: vmx -- disable preemption to enable vsx in aes_ctr.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] update mediatek crypto driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: fix %progbits -> @progbits
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: make constants readonly, allow linker to merge them
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - Add mode to test specified algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - fix issue with v2.22 and older assembler
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: tcrypt - Add debug prints
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes-blk - honour iv_out requirement in CBC and CTR modes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: img-hash - use dma_data_direction when calling dma_map_sg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Add support for ECDSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/10] crypto: arm64/aes - replace scalar fallback with plain NEON fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 09/10] crypto: arm64/aes-neon-blk - tweak performance for low end cores
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 08/10] crypto: arm64/aes - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 07/10] crypto: arm64/aes - avoid literals for cross-module symbol references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 06/10] crypto: arm64/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 05/10] crypto: arm64/aes-blk - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 04/10] crypto: arm64/aes-ce-ccm - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 03/10] crypto: arm/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: arm/aes-ce - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 01/10] crypto: arm64/aes-neon-bs - honour iv_out requirement in CTR mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 00/10] crypto - AES for ARM/arm64 updates for v4.11 (round #2)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: camellia: add missing declarations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4]crypto:chcr- Bug Fixes for 4.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] fs/pstore: fs/squashfs: Change usage of LZ4 to work with new LZ4 version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/4] crypto: Change LZ4 modules to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/4] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/4] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] lib: Update LZ4 compressor module
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] lib: Update LZ4 compressor module
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] lib: Update LZ4 compressor module
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] lib: Update LZ4 compressor module
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 4/4] fs/pstore: fs/squashfs: Change usage of LZ4 to work with new LZ4 version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: Change LZ4 modules to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] misc: amd-sp: introduce the AMD Secure Processor device
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Introduce AMD Secure Processor device
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: move CCP device driver to misc
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] misc: amd-sp: introduce the AMD Secure Processor device
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 5/6] crypto: testmgr: add ECDSA tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 4/6] crypto: ecdsa: add ECDSA SW implementation
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 5/6] crypto: testmgr: add ECDSA tests
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt: add ECDSA test modes
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 1/6] crypto: ecc: separate out ecc and ecdh
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 4/6] crypto: ecdsa: add ECDSA SW implementation
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 3/6] crypto: ecc: export vli and ecc ops
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 2/6] crypto: ecc: add vli and ecc ops
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- [PATCH 0/6] Add support for ECDSA algorithm
- From: Nitin Kumbhar <nkumbhar@xxxxxxxxxx>
- Re: [PATCH 0/2] Introduce AMD Secure Processor device
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: vmx -- disable preemption to enable vsx in aes_ctr.c
- From: Li Zhong <zhong@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] crypto: mediatek - move HW control data to transformation context
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 0/8] update mediatek crypto driver
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 7/8] crypto: mediatek - add support to CTR mode
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 3/8] crypto: mediatek - make crypto request queue management more generic
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 8/8] crypto: mediatek - add support to GCM mode
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 4/8] crypto: mediatek - rework crypto request completion
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 6/8] crypto: mediatek - fix typo and indentation
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 2/8] crypto: mediatek - fix incorrect data transfer result
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- [PATCH 5/8] crypto: mediatek - regroup functions by usage
- From: Ryder Lee <ryder.lee@xxxxxxxxxxxx>
- Re: [PATCH] x86/crypto: make constants readonly, allow linker to merge them
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] x86/crypto: make constants readonly, allow linker to merge them
- From: Denys Vlasenko <dvlasenk@xxxxxxxxxx>
- Re: [PATCH] x86/crypto: fix %progbits -> @progbits
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] x86/crypto: fix %progbits -> @progbits
- From: Denys Vlasenko <dvlasenk@xxxxxxxxxx>
- Re: [PATCH 0/2] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/2] crypto: move CCP device driver to misc
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/2] misc: amd-sp: introduce the AMD Secure Processor device
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Introduce AMD Secure Processor device
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: move CCP device driver to misc
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Introduce AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 2/2] misc: amd-sp: introduce the AMD Secure Processor device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v3] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: arm/aes-neonbs - fix issue with v2.22 and older assembler
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH v3] crypto: Add IV generation algorithms
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [PATCH 3/8] random: trigger random_ready callback upon crng_init == 1
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: tcrypt - Add mode to test specified algs
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- Re: [PATCH 7/8] random: remove noop function call to xfer_secondary_pool
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH v3] crypto: Add IV generation algorithms
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH] crypto: tcrypt - Add debug prints
- From: Rabin Vincent <rabin.vincent@xxxxxxxx>
- [RFC PATCH v3] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- [RFC PATCH v3] IV Generation algorithms for dm-crypt
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] random: remove unused branch in hot code path
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 3/8] random: trigger random_ready callback upon crng_init == 1
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 00/10] crypto - AES for ARM/arm64 updates for v4.11 (round #2)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 02/10] crypto: arm/aes-ce - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 03/10] crypto: arm/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 01/10] crypto: arm64/aes-neon-bs - honour iv_out requirement in CTR mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 07/10] crypto: arm64/aes - avoid literals for cross-module symbol references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 10/10] crypto: arm64/aes - replace scalar fallback with plain NEON fallback
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 09/10] crypto: arm64/aes-neon-blk - tweak performance for low end cores
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 05/10] crypto: arm64/aes-blk - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 04/10] crypto: arm64/aes-ce-ccm - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 08/10] crypto: arm64/aes - performance tweak
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 06/10] crypto: arm64/chacha20 - remove cra_alignmask
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm64/aes-blk - honour iv_out requirement in CBC and CTR modes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [RFC PATCH 6/6] dm-crypt: Add bulk crypto processing support
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: camellia: add missing declarations
- From: Nicholas Mc Guire <hofrat@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH] crypto: generic/cts - fix regression in iv handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] dm-crypt: Add bulk crypto processing support
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- [PATCH 1/1] crypto: img-hash - use dma_data_direction when calling dma_map_sg
- From: Nicolas Iooss <nicolas.iooss_linux@xxxxxxx>
- Re: [BISECT] ARM build errors on GCC v6.2 (crypto: arm/aes - replace scalar AES cipher)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [BISECT] ARM build errors on GCC v6.2 (crypto: arm/aes - replace scalar AES cipher)
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [BISECT] ARM build errors on GCC v6.2 (crypto: arm/aes - replace scalar AES cipher)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [BISECT] ARM build errors on GCC v6.2 (crypto: arm/aes - replace scalar AES cipher)
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- warning in crypto_wait_for_test+0x84/0x88
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v2] virtio-crypto: adjust priority of algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes - avoid reserved 'tt' mnemonic in asm code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] n2rng: add support for m5/m7 rng register layout
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: mediatek - make symbol of_crypto_id static
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - use calculated count for number of test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v1 4/4] crypto:chcr-fix itnull.cocci warnings
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 3/4] crypto:chcr- Check device is allocated before use
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 1/4] crypto:chcr-Change flow IDs
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 2/4] crypto:chcr- Fix panic on dma_unmap_sg
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 0/4]crypto:chcr- Bug Fixes for 4.10
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- [PATCH] crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/6] crypto: aesni-intel - Add bulk request support
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] virtio-crypto: adjust priority of algorithm
- From: Gonglei <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH] virtio-crypto: adjust priority of algorithm
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - don't DMA map IV from stack in test_skcipher()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: arm/aes - avoid reserved 'tt' mnemonic in asm code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] virtio-crypto: adjust priority of algorithm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [PATCH] crypto: testmgr - don't DMA map IV from stack in test_skcipher()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH] virtio-crypto: adjust priority of algorithm
- From: Gonglei <arei.gonglei@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/6] crypto: aesni-intel - Add bulk request support
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- RE: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [cryptodev:master 43/44] arch/arm/crypto/aes-cipher-core.S:174: Error: ARM register expected -- `ldr tt,=crypto_ft_tab'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [cryptodev:master 43/44] arch/arm/crypto/aes-cipher-core.S:21: Error: selected processor does not support `tt .req ip' in ARM mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 43/44] arch/arm/crypto/aes-cipher-core.S:21: Error: selected processor does not support `tt .req ip' in ARM mode
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 3/4] n2rng: support new hardware register layout
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- [PATCH 4/4] n2rng: update version info
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- [PATCH 0/4] n2rng: add support for m5/m7 rng register layout
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- [PATCH 2/4] n2rng: add device data descriptions
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- [PATCH 1/4] n2rng: limit error spewage when self-test fails
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- Re: [PATCH v1 3/8] crypto:chcr- Fix key length for RFC4106
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: mediatek - fix format string for 64-bit builds
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: mediatek - remove ARM dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: picoxcell - Cleanups removing non-DT code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mediatek: don't return garbage err on successful return
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Replaced gcc specific attributes with macros from compiler.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - use kmemdup instead of kmalloc+memcpy
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] crypto:chcr- Fix key length for RFC4106
- From: Harsh Jain <Harsh@xxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fix itnull.cocci warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/8] crypto:chcr- Bug fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v1 3/8] crypto:chcr- Fix key length for RFC4106
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: kpp - clear CRYPTO_ALG_DEAD bit in prepare_alg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH -next] crypto: mediatek - make symbol of_crypto_id static
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v4 3/3] drivers: crypto: Enable CPT options crypto for build
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] crypto: testmgr - use calculated count for number of test vectors
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4 3/3] drivers: crypto: Enable CPT options crypto for build
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] drivers: crypto: fix ifnullfree.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH 6/6] dm-crypt: Add bulk crypto processing support
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 5/6] crypto: aesni-intel - Add bulk request support
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 4/6] crypto: simd - Add bulk request support
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 3/6] crypto: cryptd - Add skcipher bulk request support
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 2/6] crypto: skcipher - Add bulk request support to walk
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 1/6] crypto: skcipher - Add bulk request processing API
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- [RFC PATCH 0/6] Add bulk skcipher requests to crypto API and dm-crypt
- From: Ondrej Mosnacek <omosnacek@xxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 3/3] drivers: crypto: Enable CPT options crypto for build
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <gcherian@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <gcherian@xxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: arm64 broken
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- arm64 broken
- From: Rob Rice <rob.rice@xxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 7/7] crypto: arm64/aes - reimplement bit-sliced ARM/NEON implementation for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: arm64/aes - add scalar implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: arm/chacha20 - implement NEON version based on SSE3 code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: arm/aes - replace scalar AES cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: arm64/chacha20 - implement NEON version based on SSE3 code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: arm64/aes-blk - expose AES-CTR as synchronous cipher as well
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- RE: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Ondrej Mosnáček <omosnacek+linux-crypto@xxxxxxxxx>
- [PATCH 2/2] crypto: mediatek - fix format string for 64-bit builds
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: mediatek - remove ARM dependencies
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: x86/chacha20 - Manually align stack buffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2] crypto: x86/chacha20 - Manually align stack buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: x86/chacha20 - Manually align stack buffer
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- crypto: x86/chacha20 - Manually align stack buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <gcherian@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v4 1/3] drivers: crypto: Add Support for Octeon-tx CPT Engine
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v4 3/3] drivers: crypto: Enable CPT options crypto for build
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v4 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <george.cherian@xxxxxxxxxx>
- [PATCH v4 0/3] Add Support for Cavium Cryptographic Acceleration Unit
- From: George Cherian <george.cherian@xxxxxxxxxx>
- Re: [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] Switch BPF's digest to SHA256
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH v2 2/8] crypto/sha256: Export a sha256_{init,update,final}_direct() API
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 4/8] bpf: Use SHA256 instead of SHA1 for bpf digests
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 3/8] crypto/sha256: Build the SHA256 core separately from the crypto module
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 5/8] bpf: Avoid copying the entire BPF program when hashing it
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 6/8] bpf: Rename fdinfo's prog_digest to prog_sha256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 7/8] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 1/8] crypto/sha256: Factor out the parts of base API that don't use shash_desc
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 0/8] Switch BPF's digest to SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- x86-64: Maintain 16-byte stack alignment
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- RE: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH v8 1/1] crypto: add virtio-crypto driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] fs/pstore: fs/squashfs: Change usage of LZ4 to comply with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/13] crypto: copy AAD during encrypt for AEAD ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 01/13] crypto: service function to copy AAD from src to dst
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 02/13] crypto: gcm_generic - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 03/13] crypto: ccm_generic - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 04/13] crypto: rfc4106-gcm-aesni - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 05/13] crypto: ccm-aes-ce - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 06/13] crypto: talitos - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 07/13] crypto: picoxcell - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 08/13] crypto: ixp4xx - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 09/13] crypto: atmel - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 10/13] crypto: caam - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 11/13] crypto: chelsio - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 12/13] crypto: nx - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 13/13] crypto: qat - copy AAD during encryption
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: Is the asynchronous hash crypto API asynchronous?
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: Is the asynchronous hash crypto API asynchronous?
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: Is the asynchronous hash crypto API asynchronous?
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/6] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Is the asynchronous hash crypto API asynchronous?
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Rui Salvaterra <rsalvaterra@xxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] lib: Update LZ4 compressor module based on LZ4 v1.7.2.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] fs/pstore: fs/squashfs: Change usage of LZ4 to comply with new LZ4 module version
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: Change LZ4 modules to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] Update LZ4 compressor module
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] lib/decompress_unlz4: Change module to work with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] fs/pstore: fs/squashfs: Change usage of LZ4 to comply with new LZ4 module version
- From: Sven Schmidt <4sschmid@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: picoxcell - Cleanups removing non-DT code
- From: Jamie Iles <jamie@xxxxxxxxxxxxx>
- [PATCH] fix itnull.cocci warnings
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: Geode LX AES/RNG driver triggers warning
- From: David Gstir <david@xxxxxxxxxxxxx>
- [RFT PATCH] crypto: arm/aes - replace scalar AES cipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Geode LX AES/RNG driver triggers warning
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v1 8/8] crypto:chcr- Fix wrong typecasting
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 6/8] crypto:chcr- Change algo priority
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 2/8] crypto:chcr- Fix panic on dma_unmap_sg
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 3/8] crypto:chcr- Fix key length for RFC4106
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 0/8] crypto:chcr- Bug fixes
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 1/8] crypto:chcr-Change flow IDs
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 7/8] crypto:chcr- Check device is allocated before use
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 4/8] crypto:chcr- Use cipher instead of Block Cipher in gcm setkey
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- [PATCH v1 5/8] crypto:chcr: Change cra_flags for cipher algos
- From: Harsh Jain <harsh@xxxxxxxxxxx>
- Re: [PATCH v3 2/3] drivers: crypto: Add the Virtual Function driver for CPT
- From: George Cherian <gcherian@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] drivers: crypto: Add Support for Octeon-tx CPT Engine
- From: George Cherian <gcherian@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: console noise after commit c1e9b3b0eea
- From: Shannon Nelson <shannon.nelson@xxxxxxxxxx>
- Re: [PATCH 1/5] ARM: wire up HWCAP2 feature bits to the CPU modalias
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: arm64/aes - add scalar implementation
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: Replaced gcc specific attributes with macros from compiler.h
- From: "Gideon D'souza" <gidisrael@xxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [PATCH 0/6] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Geode LX AES/RNG driver triggers warning
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Gilad Ben-Yossef <gilad@xxxxxxxxxxxxx>
- [PATCH] crypto: mediatek: don't return garbage err on successful return
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] ARM: wire up HWCAP2 feature bits to the CPU modalias
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] ARM: wire up HWCAP2 feature bits to the CPU modalias
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/6] crypto: arm64/aes - reimplement bit-sliced ARM/NEON implementation for arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/6] crypto: arm64/aes-blk - expose AES-CTR as synchronous cipher as well
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/6] crypto: arm64/chacha20 - implement NEON version based on SSE3 code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/6] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/6] crypto: generic/aes - export encrypt and decrypt entry points
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/6] crypto: ARM/arm64 - AES and ChaCha20 updates for v4.11
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/6] crypto: arm/chacha20 - implement NEON version based on SSE3 code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/3] crypto: picoxcell - Cleanups removing non-DT code
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] crypto: picoxcell - Cleanups removing non-DT code
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/3] crypto: picoxcell - Remove platform device ID table
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: picoxcell - Remove spacc_is_compatible() wrapper function
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: picoxcell - Allow driver to build COMPILE_TEST is enabled
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH 0/3] crypto: picoxcell - Cleanups removing non-DT code
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix module autoload for non-OF registration
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix module autoload for non-OF registration
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix module autoload for non-OF registration
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: picoxcell - Fix module autoload for non-OF registration
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: picoxcell - Fix module autoload for non-OF registration
- From: Javier Martinez Canillas <javier@xxxxxxxxxxxxxxx>
- [PATCH] crypto: kpp - clear CRYPTO_ALG_DEAD bit in prepare_alg
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- [PATCH] crypto: Replaced gcc specific attributes with macros from compiler.h
- From: gidisrael@xxxxxxxxx
- Geode LX AES/RNG driver triggers warning
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - use kmemdup instead of kmalloc+memcpy
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- Re: orinoco: Use shash instead of ahash for MIC calculations
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH] virtio-crypto: support crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: skcipher - introduce walksize attribute for SIMD algos
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - increase number of supported devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - modify format of dev top level debugfs entries
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - zero esram only for DH85x devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix bar discovery for c62x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - replace hardcoded BIT(0) in vf_isr
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix comments describing adf_disable_sriov()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix indentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: orinoco: Use shash instead of ahash for MIC calculations
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: orinoco: Use shash instead of ahash for MIC calculations
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: simd ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] crypto: skcipher - introduce walksize attribute for SIMD algos
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: simd ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Binoy Jayan <binoy.jayan@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [ANNOUNCE] /dev/random - a new approach (code for 4.10-rc1)
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: simd ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - initialize cra_flags before register into kpp
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: simd ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: chacha20 - convert generic and x86 versions to skcipher
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: chacha20 - convert generic and x86 versions to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: chacha20 - convert generic and x86 versions to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: chacha20 - convert generic and x86 versions to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Cavium ThunderX ZIP driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: xts(ecb(aes-asm))
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: simd ciphers
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/8] random: remove unused branch in hot code path
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 1/8] random: remove stale maybe_reseed_primary_crng
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 8/8] random: move FIPS continuous test to output functions
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 7/8] random: remove noop function call to xfer_secondary_pool
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 2/8] random: remove stale urandom_init_wait
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 3/8] random: trigger random_ready callback upon crng_init == 1
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/8] random: cleanup of code after removal of nonblocking pool
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 5/8] random: remove variable limit
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 6/8] random: fix comment for unused random_min_urandom_seed
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Cavium ThunderX ZIP driver
- From: "Challa, Mahipal" <Mahipal.Challa@xxxxxxxxxx>
- [cryptodev:master 4/17] arch/arm/crypto/chacha20-neon-glue.c:68:32: error: passing argument 1 of 'crypto_chacha20_crypt' from incompatible pointer type
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 4/17] arch/arm64/crypto/chacha20-neon-glue.c:66:32: error: passing argument 1 of 'crypto_chacha20_crypt' from incompatible pointer type
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCHv2] crypto: testmgr: Use heap buffer for acomp test input
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] Add MediaTek crypto accelerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -resend with CC] crypto: algif_hash, avoid zero-sized array
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] hwrng: core: do not use multiple blank lines
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - RFC4106 can zero copy when !PageHighMem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bring back alphabetical order of Makefile
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: chacha20 - convert generic and x86 versions to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: arm64/ARM: NEON accelerated ChaCha20
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [sparc64] cryptomgr_test OOPS kernel 4.9.0+
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Cavium ThunderX ZIP driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] hwrng: core: Remove linux/sched.h from includes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/aes: reimplement bit-sliced ARM/NEON implementation for arm64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] crypto: arm64/chacha20 - implement NEON version based on SSE3 code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/aes-neonbs - process 8 blocks in parallel if we can
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] virtio-crypto: support crypto engine framework
- From: Gonglei <arei.gonglei@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 3/6] bpf: Use SHA256 instead of SHA1 for bpf digests
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 3/6] bpf: Use SHA256 instead of SHA1 for bpf digests
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [sparc64] cryptomgr_test OOPS kernel 4.9.0+
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [sparc64] cryptomgr_test OOPS kernel 4.9.0+
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 0/6] Switch BPF's digest to SHA256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [sparc64] cryptomgr_test OOPS kernel 4.9.0+
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 2/2] crypto: skcipher AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 1/2] crypto: aead AF_ALG - overhaul memory management
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH 0/2] crypto: AF_ALG memory management fix
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 3/6] bpf: Use SHA256 instead of SHA1 for bpf digests
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC PATCH 4.10 1/6] crypto/sha256: Refactor the API so it can be used without shash
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 3/6] bpf: Use SHA256 instead of SHA1 for bpf digests
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 2/6] crypto/sha256: Make the sha256 library functions selectable
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 4/6] bpf: Avoid copying the entire BPF program when hashing it
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 5/6] bpf: Rename fdinfo's prog_digest to prog_sha256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 6/6] net: Rename TCA*BPF_DIGEST to ..._SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4.10 0/6] Switch BPF's digest to SHA256
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] crypto: Add IV generation algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Test AEAD/authenc algorithms from userspace
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: mediatek - add DT bindings documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 00/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 01/12] crypto: atmel-sha: create function to get an Atmel SHA device
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 02/12] crypto: atmel-sha: update request queue management to make it more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 03/12] crypto: atmel-sha: make atmel_sha_done_task more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 05/12] crypto: atmel-sha: add atmel_sha_wait_for_data_ready()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 04/12] crypto: atmel-sha: redefine SHA_FLAGS_SHA* flags to match SHA_MR_ALGO_SHA*
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 06/12] crypto: atmel-sha: add SHA_MR_MODE_IDATAR0
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 07/12] crypto: atmel-sha: add atmel_sha_cpu_start()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 08/12] crypto: atmel-sha: add simple DMA transfers
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 10/12] crypto: atmel-aes: fix atmel_aes_handle_queue()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 12/12] crypto: atmel-sha: add verbose debug facilities to print hw register names
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2 09/12] crypto: atmel-sha: add support to hmac(shaX)
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 01/12] crypto: atmel-sha: create function to get an Atmel SHA device
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 03/12] crypto: atmel-sha: make atmel_sha_done_task more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 11/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 12/12] crypto: atmel-sha: add verbose debug facilities to print hw register names
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 10/12] crypto: atmel-aes: fix atmel_aes_handle_queue()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 04/12] crypto: atmel-sha: redefine SHA_FLAGS_SHA* flags to match SHA_MR_ALGO_SHA*
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 05/12] crypto: atmel-sha: add atmel_sha_wait_for_data_ready()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 06/12] crypto: atmel-sha: add SHA_MR_MODE_IDATAR0
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 07/12] crypto: atmel-sha: add atmel_sha_cpu_start()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 09/12] crypto: atmel-sha: add support to hmac(shaX)
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 08/12] crypto: atmel-sha: add simple DMA transfers
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 02/12] crypto: atmel-sha: update request queue management to make it more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 00/12] crypto: atmel-authenc: add support to authenc(hmac(shaX),Y(aes)) modes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: George's crazy full state idea (Re: HalfSipHash Acceptable Usage)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5
- From: "Theodore Ts'o" <tytso@xxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]