Linux Crypto
[Prev Page][Next Page]
- [linux-next:master] BUILD REGRESSION e27090b1413ff236ca1aec26d6b022149115de2c
- From: kernel test robot <lkp@xxxxxxxxx>
- [RESEND PATCH] dt-bindings: crypto: qcom,prng: Add SM8450
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 10/10] crypto: octeontx2: support setting ctx ilen for inline CPT LF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 09/10] crypto/octeontx2: register error interrupts for inline cptlf
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 08/10] crypto: octeontx2: add ctx_val workaround
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 07/10] octeontx2-af: update CPT inbound inline IPsec mailbox
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 06/10] crypto: octeontx2: add LF reset on queue disable
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 05/10] crypto: octeontx2: remove errata workaround for CN10KB or CN10KA B0 chip.
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 01/10] crypto: octeontx2: remove CPT block reset
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 02/10] crypto: octeontx2: add SGv2 support for CN10KB or CN10KA B0
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH v1 00/10] Add Marvell CN10KB/CN10KA B0 support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Crypto Update for 6.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- RE: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- RE: [PATCH] crypto: virtio-crypto: call finalize with bh disabled
- From: "Gonglei (Arei)" <arei.gonglei@xxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- [GIT PULL] Crypto Update for 6.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 12/12] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- Re: [PATCH 04/12] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 7/7] crypto: Fixes uninitialized skcipher_walk use in aria_gfni_avx512_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 5/7] crypto: Fixes uninitialized skcipher_walk use in aria_aesni_avx2_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 6/7] crypto: Fixes uninitialized skcipher_walk use in aria_aesni_avx_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 3/7] crypto: Fixes uninitialized skcipher_walk use in chacha_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 4/7] crypto: Fixes uninitialized skcipher_walk use in aesni-intel_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 2/7] crypto: Fixes uninitialized skcipher_walk use in des3_ede_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 1/7] crypto: Fixes uninitialized skcipher_walk use in sm4_aesni_avx_glue
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- [PATCH 0/7] crypto: Proper Initialization of `struct skcipher_walk` in x86 Glue Files
- From: Yuran Pereira <yuran.pereira@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [REGRESSION] dm_crypt essiv ciphers do not use async driver mv-aes-cbc anymore
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: linux-next: build failure after merge of the crypto tree
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Paulo Alcantara <pc@xxxxxxxxxxxxx>
- RE: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- [PATCH bpf-next v3 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v3 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Roxana Nicolescu <roxana.nicolescu@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Roxana Nicolescu <roxana.nicolescu@xxxxxxxxxxxxx>
- Re: [ppc64le] WARN at crypto/testmgr.c:5804
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [ppc64le] WARN at crypto/testmgr.c:5804
- From: Sachin Sant <sachinp@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - prevent underflow in rp2srv_store()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm()
- From: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: J Lovejoy <opensource@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] RISC-V: support some cryptography accelerations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Christoph Hellwig <hch@xxxxxx>
- RE: [PATCH] RDMA/siw: use crypto_shash_digest() in siw_qp_prepare_tx()
- From: Bernard Metzler <BMT@xxxxxxxxxxxxxx>
- [PATCH v2 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH v2 0/4] drbg small fixes
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [bug report] lib/mpi: Extend the MPI library
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa - add a check for allocation failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [bug report] lib/mpi: Extend the MPI library
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] crypto: rsa - add a check for allocation failure
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH] dm-verity: hash blocks with shash import+finup when possible
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Steve French <smfrench@xxxxxxxxx>
- [PATCH 3/4] crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 4/4] crypto: drbg - Remove SHA1 from drbg
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 2/4] crypto: drbg - update FIPS CTR self-checks to aes256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/4] crypto: drbg - ensure most preferred type is FIPS health checked
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: shash - don't exclude async statuses from error stats
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: x86/sha1 - autoload if SHA-NI detected
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] ubifs: use crypto_shash_tfm_digest() in ubifs_hmac_wkm()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] smb: use crypto_shash_digest() in symlink_hash()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] nvme-auth: use crypto_shash_tfm_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] dm-integrity: use crypto_shash_digest() in sb_mac()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] dm-crypt: use crypto_shash_digest() in crypt_iv_tcw_whitening()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] RDMA/siw: use crypto_shash_digest() in siw_qp_prepare_tx()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] RDMA/irdma: use crypto_shash_digest() in irdma_ieq_check_mpacrc()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - remove incorrect type cast
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - print device abnormal information
- From: Weili Qian <qianweili@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] crypto: adiantum - flush destination page before unmapping
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH bpf-next v2 2/2] selftests: bpf: crypto skcipher algo selftests
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- [PATCH bpf-next v2 1/2] bpf: add skcipher API support to TC/XDP programs
- From: Vadim Fedorenko <vadfed@xxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] crypto: riscv/aes - Implement scalar Zkn version for RV32
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH 00/30] crypto: reduce ahash API overhead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: pkcs7 x509 add FIPS 202 SHA-3 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - move adf_cfg_services
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] add ras error detection and reporting for GEN4 devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: jitter - use permanent health test storage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/17] crypto: stop supporting alignmask in shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: n2 - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccree - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add heartbeat error simulator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,prng: document SM8650
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: "NK, JESHWANTHKUMAR" <jeshwanthkumar.nk@xxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: [PATCH 2/3] crypto: ccp - Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 12/12] RISC-V: crypto: add Zvkb accelerated ChaCha20 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 11/12] RISC-V: crypto: add Zvksh accelerated SM3 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 09/12] RISC-V: crypto: add Zvknhb accelerated SHA384/512 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 10/12] RISC-V: crypto: add Zvksed accelerated SM4 implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 08/12] RISC-V: crypto: add Zvknha/b accelerated SHA224/256 implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 06/12] RISC-V: crypto: add accelerated AES-CBC/CTR/ECB/XTS implementations
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 07/12] RISC-V: crypto: add Zvkg accelerated GCM GHASH implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 05/12] crypto: scatterwalk - Add scatterwalk_next() to get the next scatterlist in scatter_walk
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 04/12] RISC-V: crypto: add Zvkned accelerated AES implementation
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 03/12] RISC-V: crypto: add OpenSSL perl module for vector instructions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 02/12] RISC-V: hook new crypto subdir into build-system
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 01/12] RISC-V: add helper function to read the vector VLEN
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- [PATCH 00/12] RISC-V: provide some accelerated cryptography implementations using vector extensions
- From: Jerry Shih <jerry.shih@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: Issue: Can padata avoid dealing with CPU-related operations?
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- [PATCH] hwrng: ingenic: Replace of_device.h with explicit of.h include
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH 17/42] crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 05/42] crypto: amlogic-gxl-core - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 22/42] crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Corentin LABBE <clabbe@xxxxxxxxxxxx>
- Re: [PATCH 04/30] crypto: sun8i-ss - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 03/30] crypto: sun8i-ce - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH] lib/crypto/aesgcm.c:add kernel docs for aesgcm_mac
- From: Sagar Vashnav <sagarvashnav72427@xxxxxxxxx>
- Re: [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] docs: module-signing: adjust guide after sha1 and sha224 support is gone
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom,prng: document SM8650
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH] dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- [PATCH 3/3] tee: amdtee: Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 2/3] crypto: ccp - Use psp_tee_alloc_buffer() and psp_tee_free_buffer()
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 1/3] crypto: ccp - Add function to allocate and free memory using DMA APIs
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- [PATCH 0/3] Introduce DMA APIs to allocate and free TEE shared memory
- From: jeshwank <JESHWANTHKUMAR.NK@xxxxxxx>
- Re: [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Andi Shyti <andi.shyti@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4 5/5] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 3/5] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 4/5] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 0/5] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] certs: Break circular dependency when selftest is modular
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 1/2] kexec: fix KEXEC_FILE dependencies
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 11/42] crypto: axis/artpec6 - Convert to platform remove callback returning void
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 07/42] crypto: aspeed-hace - Convert to platform remove callback returning void
- From: Andrew Jeffery <andrew@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/42] crypto: aspeed-acry - Convert to platform remove callback returning void
- From: Andrew Jeffery <andrew@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 6/6] Documentation/module-signing.txt: bring up to date
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 4/6] crypto: x509 pkcs7 - allow FIPS 202 SHA-3 signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 5/6] crypto: enable automatic module signing with FIPS 202 SHA-3
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 3/6] crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 2/6] crypto: FIPS 202 SHA-3 register in hash info for IMA
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/6] x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 0/6] crypto: pkcs7 x509 add FIPS 202 SHA-3 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 21/30] crypto: chacha20poly1305 - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 30/30] crypto: ahash - optimize performance when wrapping shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 28/30] crypto: hash - move "ahash wrapping shash" functions to ahash.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 29/30] crypto: ahash - check for shash type instead of not ahash type
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 27/30] crypto: talitos - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 26/30] crypto: chelsio - stop using crypto_ahash::init
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 24/30] crypto: ahash - remove struct ahash_request_priv
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 25/30] crypto: ahash - improve file comment
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 22/30] crypto: gcm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 23/30] crypto: ahash - remove crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 19/30] net: ipv6: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 18/30] net: ipv4: stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/30] crypto: ahash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/30] crypto: ccm - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/30] crypto: authencesn - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/30] crypto: stm32 - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 17/30] crypto: testmgr - stop checking crypto_ahash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/30] crypto: authenc - stop using alignmask of ahash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/30] crypto: starfive - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/30] crypto: omap-sham - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/30] crypto: rockchip - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/30] crypto: s5p-sss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/30] crypto: mxs-dcp - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/30] crypto: talitos - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/30] crypto: sun8i-ce - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/30] crypto: atmel - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/30] crypto: artpec6 - stop setting alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/30] crypto: sun8i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/30] crypto: reduce ahash API overhead
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/30] crypto: shash - remove crypto_shash_ctx_aligned()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Richard Fontana <rfontana@xxxxxxxxxx>
- [PATCH] treewide: Add SPDX identifier to IETF ASN.1 modules
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: kernel test robot <lkp@xxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: mscode_parser - remove sha224 authenticode support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH] MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] crypto: qat - add heartbeat error simulator
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH] crypto: qat - fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] crypto: qat - move adf_cfg_services
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Jernej Škrabec <jernej.skrabec@xxxxxxxxx>
- [PATCH v2 09/11] crypto: qat - add rate limiting sysfs interface
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 11/11] crypto: qat - add num_rps sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 10/11] crypto: qat - add rp2svc sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 07/11] crypto: qat - add retrieval of fw capabilities
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 06/11] crypto: qat - add bits.h to icp_qat_hw.h
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 05/11] units: Add BYTES_PER_*BIT
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 04/11] crypto: qat - move admin api
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 03/11] crypto: qat - fix ring to service map for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 02/11] crypto: qat - use masks for AE groups
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 01/11] crypto: qat - refactor fw config related functions
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH v2 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [RFC PATCH] crypto: de-prioritize QAT
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v2] qat: fix deadlock in backlog processing
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 9/9] crypto: qat - count QAT GEN4 errors
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 8/9] crypto: qat - add error counters
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 7/9] crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 4/9] crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 6/9] crypto: qat - add adf_get_aram_base() helper function
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 3/9] crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 5/9] crypto: qat - add handling of compression related errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 1/9] crypto: qat - add infrastructure for error reporting
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 2/9] crypto: qat - add reporting of correctable errors for QAT GEN4
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- [PATCH 0/9] add ras error detection and reporting for GEN4 devices
- From: Shashank Gupta <shashank.gupta@xxxxxxxxx>
- Re: [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - prevent soft lockup in receive loop
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Michal Simek <michal.simek@xxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: <Hari.PrasathGE@xxxxxxxxxxxxx>
- Re: [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH 00/42] crypto: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 42/42] crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 07/42] crypto: aspeed-hace - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 39/42] crypto: stm32/cryp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 06/42] crypto: aspeed-acry - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 41/42] crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 25/42] crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 38/42] crypto: stm32/crc32 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 33/42] crypto: qcom-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 24/42] crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 14/42] crypto: ccp/sp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 01/42] crypto: sun4i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 03/42] crypto: sun8i-ss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 40/42] crypto: talitos - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 34/42] crypto: rockchip/rk3288 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 37/42] crypto: sahara - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 26/42] crypto: marvell/cesa - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 35/42] crypto: s5p-sss - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 36/42] crypto: sa2ul - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 27/42] crypto: mxs-dcp - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 02/42] crypto: sun8i-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 22/42] crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 32/42] crypto: qce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 30/42] crypto: omap-des - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 19/42] crypto: hisilicon/trng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 18/42] crypto: hisilicon/sec - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 31/42] crypto: omap-sham - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 29/42] crypto: omap-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 28/42] crypto: n2_core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 23/42] crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 13/42] crypto: caam/jr - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 21/42] crypto: inside-secure/safexcel - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 12/42] crypto: bcm/cipher - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 08/42] crypto: atmel-aes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 20/42] crypto: img-hash - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 11/42] crypto: axis/artpec6 - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 17/42] crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 10/42] crypto: atmel-tdes - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 15/42] crypto: ccree/cc - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 16/42] crypto: exynos-rng - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 09/42] crypto: atmel-sha - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 04/42] crypto: amcc/crypto4xx - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 05/42] crypto: amlogic-gxl-core - Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: skcipher - fix weak key check for lskciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] module: Do not offer sha224 for built-in module signing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: pkcs7: remove sha1 support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: arm64 - clean up backwards function names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: adiantum optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix double free during reset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/sha256 - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm64/sha2-ce - implement ->digest for sha256
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: shash optimizations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] virtio-crypto: handle config changed by work queue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v2] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: jitter - use permanent health test storage
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 17/17] crypto: shash - remove crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/17] crypto: testmgr - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/17] crypto: shash - remove support for nonzero alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/17] crypto: hctr2 - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/17] crypto: adiantum - stop using alignmask of shash_alg
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/17] crypto: xcbc - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/17] crypto: drbg - stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/17] libceph: stop checking crypto_shash_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/17] crypto: hmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/17] crypto: cmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/17] crypto: vmac - don't set alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/17] crypto: cbcmac - remove unnecessary alignment logic
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/17] crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/17] crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/17] crypto: mips/crc32 - remove redundant setting of alignmask to 0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/17] crypto: stm32 - remove unnecessary alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/17] crypto: sparc/crc32c - stop using the shash alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/17] crypto: stop supporting alignmask in shash
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] crypto: jitter - use permanent health test storage
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH] crypto: shash - eliminate indirect call for default import and export
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: Neil Armstrong <neil.armstrong@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation
- From: Ben Greear <greearb@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qcom: add HW_RANDOM dependency
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- [PATCH] crypto: qcom-rng - Add missing dependency on hw_random
- From: André Apitzsch <git@xxxxxxxxxxx>
- Re: [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH V2] dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 49/50] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 50/50] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 47/50] x86/sev: Add KVM commands for per-instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 45/50] iommu/amd: Report all cases inhibiting SNP enablement
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 44/50] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 43/50] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 42/50] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 03/50] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 41/50] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 40/50] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 39/50] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 37/50] KVM: SEV: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 36/50] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 35/50] KVM: SEV: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 34/50] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 33/50] KVM: SEV: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 32/50] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 31/50] KVM: SEV: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 02/50] KVM: SVM: Fix TSC_AUX virtualization setup
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 30/50] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 29/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 28/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 27/50] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 26/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 25/50] KVM: SEV: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 21/50] KVM: SEV: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 19/50] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 16/50] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 15/50] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 14/50] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 13/50] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 12/50] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 10/50] x86/fault: Report RMP page faults for kernel addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- [PATCH RFC gmem v1 7/8] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 6/8] KVM: x86: Add KVM_X86_SNP_VM vm_type
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 5/8] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 2/8] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 1/8] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC PATCH] crypto: de-prioritize QAT
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC/REFACT] Refactoring and significantly reducing code complexity
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] crypto: qat - add retrieval of fw capabilities
- From: Tero Kristo <tero.kristo@xxxxxxxxx>
- [PATCH 00/10] Add Marvell CN10KB/CN10KA B0 support
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 10/10] crypto: octeontx2: support setting ctx ilen for inline CPT LF
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 09/10] crypto/octeontx2: register error interrupts for inline cptlf
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 08/10] crypto: octeontx2: add ctx_val workaround
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 07/10] octeontx2-af: update CPT inbound inline IPsec mailbox
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 04/10] crypto: octeontx2: add devlink option to set t106 mode
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 06/10] crypto: octeontx2: add LF reset on queue disable
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 03/10] crypto: octeontx2: add devlink option to set max_rxc_icb_cnt
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 05/10] crypto: octeontx2: remove errata workaround for CN10KB or CN10KA B0 chip.
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 02/10] crypto: octeontx2: add SGv2 support for CN10KB or CN10KA B0
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH 01/10] crypto: octeontx2: remove CPT block reset
- From: Srujana Challa <schalla@xxxxxxxxxxx>
- [PATCH] crypto: rsa - Add module alias for pkcs1pad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] certs: Break circular dependency when selftest is modular
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: (subset) [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: (subset) [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH V1 1/4] dt-bindings: crypto: qcom,prng: document SA8775P
- From: Bjorn Andersson <andersson@xxxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH v4] padata: Fix refcnt handling in padata_free_shell()
- From: WangJinchao <wangjinchao@xxxxxxxxxxx>
- [PATCH V1 3/4] arm64: dts: qcom: sa8775p: add TRNG node
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 0/4] Enable TRNG for SA8775P and SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 4/4] arm64: dts: qcom: sc7280: add TRNG node
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 2/4] dt-bindings: crypto: qcom,prng: document SC7280
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- [PATCH V1 1/4] dt-bindings: crypto: qcom,prng: document SA8775P
- From: Om Prakash Singh <quic_omprsing@xxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION e3b18f7200f45d66f7141136c25554ac1e82009b
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] misc: Add Nitro Secure Module driver
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] crypto: hisilicon/qm - alloc buffer to set and get xqc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: remove md4 driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: jitter - reuse allocated entropy collector
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: n2: Use device_get_match_data()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] crypto: qat - add cnv_errors debugfs file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] Add debugfs pm_status for qat driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] arm64: qcom: sm8x50: enable RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - add namespace to driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] crypto: qcom-rng - Add hw_random interface support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: authencesn - Fix incorrect setauthsize function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: xts - use 'spawn' for underlying single-block cipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] Fixes: 07928d9bfc81 ("padata: Remove broken queue flushing")
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: authencesn - Fix incorrect setauthsize function
- From: Ingyu Jang <ingyujang25@xxxxxxxxxxx>
- Re: [syzbot] [net] [crypto] general protection fault in scatterwalk_copychunks (4)
- From: Sabrina Dubroca <sd@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: skcipher - fix weak key check for lskciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] crypto: skcipher - fix weak key check for lskciphers
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [PATCH] crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: [syzbot] [net] [crypto] general protection fault in scatterwalk_copychunks (4)
- From: syzbot <syzbot+66e3ea42c4b176748b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH] crypto: hifn_795x - Silence gcc format-truncation false positive warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: lskcipher - Return EINVAL when ecb_name fails sanity checks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] spdm: Introduce library to authenticate devices
- From: Alistair Francis <Alistair.Francis@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] certs: Create blacklist keyring earlier
- From: Alistair Francis <Alistair.Francis@xxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [RFC v2] padata: Simplify sysfs cpumask and sequencing logic
- From: Wang Jinchao <wangjinchao@xxxxxxxxxxx>
- Re: Linux 6.5 broke iwd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Petre Eftime <petre.eftime@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Linux 6.5 broke iwd
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 01/11] crypto: qat - refactor fw config related functions
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 03/11] crypto: qat - fix ring to service map for QAT GEN4
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 00/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 07/11] crypto: qat - add retrieval of fw capabilities
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 05/11] units: Add BYTES_PER_*BIT
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 10/11] crypto: qat - add rp2svc sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 09/11] crypto: qat - add rate limiting sysfs interface
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 08/11] crypto: qat - add rate limiting feature to qat_4xxx
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 11/11] crypto: qat - add num_rps sysfs attribute
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 04/11] crypto: qat - move admin api
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 06/11] crypto: qat - add bits.h to icp_qat_hw.h
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- [PATCH 02/11] crypto: qat - use masks for AE groups
- From: Damian Muszynski <damian.muszynski@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6] misc: Add Nitro Secure Module driver
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien CHEVALLIER <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH] crypto: aspeed-hace: Use device_get_match_data()
- From: Neal Liu <neal_liu@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v6] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH] crypto: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] module: Do not offer sha224 for built-in module signing
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: mscode_parser: remove sha224 authenticode support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: pkcs7: remove sha1 support
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Dump SEV command buffer registers on SEV command error
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5] misc: Add Nitro Secure Module driver
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH v5] misc: Add Nitro Secure Module driver
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.6
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v6 11/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP13x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 08/11] arm64: dts: st: add RIFSC as an access controller for STM32MP25x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 10/11] ARM: dts: stm32: add ETZPC as a system bus for STM32MP15x boards
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 09/11] bus: etzpc: introduce ETZPC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 04/11] dt-bindings: bus: document ETZPC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 07/11] bus: rifsc: introduce RIFSC firewall controller driver
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 06/11] of: property: fw_devlink: Add support for "access-controller"
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 05/11] firewall: introduce stm32_firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 00/11] Introduce STM32 Firewall framework
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 03/11] dt-bindings: bus: document RIFSC
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 02/11] dt-bindings: treewide: add access-controllers description
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- [PATCH v6 01/11] dt-bindings: document generic access controllers
- From: Gatien Chevallier <gatien.chevallier@xxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] hwrng: geode: fix accessing registers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] PCI device authentication
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Alexander Graf <graf@xxxxxxxxxx>
- [PATCH 5/5] crypto: arm64/sha512 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/5] crypto: arm64/sha256 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/5] crypto: arm64/sha512-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/5] crypto: arm64/sha2-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/5] crypto: arm64/sha1-ce - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/5] crypto: arm64 - clean up backwards function names
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 2/2] misc: Add Nitro Secure Module driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] Import CBOR library
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto: adiantum - add fast path for single-page messages
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/4] crypto: arm/nhpoly1305 - implement ->digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/4] crypto: arm64/nhpoly1305 - implement ->digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/4] crypto: adiantum optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]