Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/6] crypto: sun4i-ss: clean unused ss
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/6] crypto: sun4i-ss: fix a few signed warning
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [cryptodev:master 17/45] drivers/crypto/ccp/ccp-dev-v5.c:838:3: error: label 'e_hwrng' used but not defined
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v4] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: DRBG: do not call drbg_instantiate in healt test
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- [PATCH] crypto: DRBG: do not call drbg_instantiate in healt test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Gary R Hook <ghook@xxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: testmgr.h
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- testmgr.h
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/7] Various fixes for the cesa driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - avoid kernel warnings on probe failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Further iMX CAAM updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: img-hash - fixes and interface changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/testmgr.c: fix !x==y confusion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Enablement of a v5 CCP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix non-conforming comment style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Fix a resource release omission in error handling code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: powerpc - CRYPT_CRC32C_VPMSUM should depend on ALTIVEC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 1/4] crypto: add template handling for RNGs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Various fixes for the cesa driver
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG zero-size hash fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- AF_ALG zero-size hash fails
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: marvell - Don't hardcode block size in mv_cesa_ahash_cache_req
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/7] crypto: marvell - Don't overwrite default creq->state during initialization
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/7] crypto: marvell - Update transformation context for each dequeued req
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/7] crypto: marvell: make mv_cesa_ahash_cache_req() return bool
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/7] crypto: marvell: turn mv_cesa_ahash_init() into a function returning void
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] crypto: marvell: remove unused parameter in mv_cesa_ahash_dma_add_cache()
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/7] Various fixes for the cesa driver
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/7] crypto: marvell: be explicit about destination in mv_cesa_dma_add_op()
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - avoid kernel warnings on probe failure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH 2/2] ath9k: disable RNG by default
- From: miaoqing@xxxxxxxxxxxxxx
- [PATCH 1/2] ath9k: change entropy formula for easier understanding
- From: miaoqing@xxxxxxxxxxxxxx
- RE: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH v2] crypto: powerpc - CRYPT_CRC32C_VPMSUM should depend on ALTIVEC
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Further iMX CAAM updates
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: AF_ALG broken?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH 11/11] crypto: caam: get rid of tasklet
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 09/11] crypto: caam: move job descriptor initialisation to ahash_edesc_alloc()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 08/11] crypto: caam: add ahash_edesc_alloc() for descriptor allocation
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 05/11] crypto: caam: replace sec4_sg pointer with array
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 04/11] crypto: caam: mark the hardware descriptor as cache line aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 03/11] crypto: caam: incorporate job descriptor into struct ahash_edesc
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 02/11] crypto: caam: ensure descriptor buffers are cacheline aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 01/11] crypto: caam: fix DMA API mapping leak
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 00/11] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha3 - Add missing ULL suffixes for 64-bit constants
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: caam - authenc fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7i file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH v3] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: img-hash - Fix set_reqsize call
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: img-hash - log a successful probe
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: img-hash - Add support for export and import
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: img-hash - Add suspend resume hooks for img hash
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: img-hash - Fix hash request context
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: img-hash - Reconfigure DMA Burst length
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: img-hash - Fix null pointer exception
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: img-hash - fixes and interface changes
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: caam - defer aead_set_sh_desc in case of zero authsize
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - fix echainiv(authenc) encrypt shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - authenc fixes
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Anton Blanchard <anton@xxxxxxxxx>
- [PATCHv3 08/11] crypto: omap-aes: Add support for multiple cores
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 00/11] crypto: omap HW crypto fixes
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 06/11] crypto: omap-des: Fix support for unequal lengths
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 01/11] crypto: omap-sham: avoid executing tasklet where not needed
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 02/11] crypto: omap-sham: add support for flushing the buffer
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 04/11] crypto: omap-sham: fix software fallback handling
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 05/11] crypto: omap-sham: fix SW fallback HMAC handling for omap2/omap3
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 07/11] crypto: omap-aes: use runtime_pm autosuspend for clock handling
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 10/11] crypto: omap-aes: fix crypto engine initialization order
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 11/11] crypto: omap-des: fix crypto engine initialization order
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 09/11] crypto: omap-aes: Add fallback support
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Anton Blanchard <anton@xxxxxxxxxx>
- [PATCH] crypto: sha3 - Add missing ULL suffixes for 64-bit constants
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 0020/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0127/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0130/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0129/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0128/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0100/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0040/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Nicolas Brunie <nbrunie@xxxxxxxxx>
- Fwd: maxwell RNG
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- [PATCH] crypto/testmgr.c: fix !x==y confusion
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- [GIT PULL] /dev/random driver fix for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Update cache with input sg only when it is unmapped
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Don't chain at DMA level when backlog is disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Fix memory leaks in TDMA chain for cipher requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/10] crypto: ccp - Enable use of the additional CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 08/10] crypto: ccp - Add support for the RNG in a version 5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 04/10] crypto: ccp - Refactor the storage block allocation code
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 06/10] crypto: ccp - Refactor code to enable checks for queue space.
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 09/10] crypto: ccp - Enable DMA service on a v5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 05/10] crypto: ccp - Refactor code supporting the CCP's RNG
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 07/10] crypto: ccp - Let a v5 CCP provide the same function as v3
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 01/10] crypto: ccp - Abstract PCI info for the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 03/10] crypto: ccp - Refactoring: symbol cleanup
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 02/10] crypto: ccp - Shorten the fields of the action structure
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 00/10] Enablement of a v5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Fix non-conforming comment style
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Nicolas Brunie <nicolas.brunie@xxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: marvell - Update cache with input sg only when it is unmapped
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Crypto Update for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [GIT PULL] /dev/random driver changes for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Crypto Fixes for 4.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell - Update cache with input sg only when it is unmapped
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: ixp4xx - Fix a "simple if" coding style warning
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 2/2] crypto: ixp4xx - Add missing npe_c release in error branches
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 0/2] Fix a resource release omission in error handling code
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- Re: [PATCH] crypto: marvell - Don't chain at DMA level when backlog is disabled
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Fix memory leaks in TDMA chain for cipher requests
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell - Don't chain at DMA level when backlog is disabled
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell - Fix memory leaks in TDMA chain for cipher requests
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [V2,1/2] powerpc: Add module autoloading based on CPU features
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [V2, 2/2] crypto: vmx - Convert to CPU feature based module autoloading
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: Max data limit for AEAD operation
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: Max data limit for AEAD operation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/glue_helper make bool
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: x86/glue_helper make bool
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH] crypto: x86/glue_helper make bool
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH] crypto: x86/glue_helper make bool
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Max data limit for AEAD operation
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCH] crypto: qat - make qat_asym_algs.o depend on asn1 headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - make qat_asym_algs.o depend on asn1 headers
- From: Thomas Backlund <tmb@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - Ignore generated files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux-next: build failure after merge of the crypto tree
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: vmx - Ignore generated files
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [Patch-V2 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: vmx - Ignore generated files
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell: Fix wrong flag used for GFP in mv_cesa_dma_add_iv_op
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [Patch-V2 1/3] cxgb4: Add Chelsio LLD support Chelsio Crypto ULD
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [Patch-V2 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [Patch-V2 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [Patch-V2 0/3] crypto/chcr: Add Chelsio Crypto Driver
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [PATCH V2 1/2] powerpc: Add module autoloading based on CPU features
- From: alastair@xxxxxxxxxxx
- [PATCH V2 2/2] crypto: vmx - Convert to CPU feature based module autoloading
- From: alastair@xxxxxxxxxxx
- [PATCH V2 0/2] Automatically load the vmx_crypto module if supported
- From: alastair@xxxxxxxxxxx
- Re: [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [cryptodev:master 147/175] DocBook: include/crypto/skcipher.h:135: warning: No description found for parameter 'base'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: vmx - Adding support for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: add template handling for RNGs
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [cryptodev:master 163/175] DocBook: include/linux/crypto.h:1: warning: no structured comments found
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 147/175] DocBook: include/crypto/skcipher.h:135: warning: No description found for parameter 'base'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [patch] crypto: nx - off by one bug in nx_of_update_msc()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-pkcs1pad - Fix akcipher request allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: testmgr - Print akcipher algorithm name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell: Fix wrong flag used for GFP in mv_cesa_dma_add_iv_op
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell: Fix wrong flag used for GFP in mv_cesa_dma_add_iv_op
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v3 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: add template handling for RNGs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto: img-hash - Add support for export and import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] PKCS#7: Fix panic when referring to the empty AKID when DEBUG defined
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/3] KEYS: Fix for erroneous trust of incorrectly signed X.509 certs
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/3] pefile: Fix the failure of calculation for digest
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/3] KEYS: Miscellaneous fixes
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [V2][PATCH 1/2] PKCS#7: Fix kernel panic when referring to the empty AuthorityKeyIdentifier
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [V2][PATCH 1/2] PKCS#7: Fix kernel panic when referring to the empty AuthorityKeyIdentifier
- From: Lans Zhang <jia.zhang@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [V2][PATCH 1/2] PKCS#7: Fix kernel panic when referring to the empty AuthorityKeyIdentifier
- From: David Howells <dhowells@xxxxxxxxxx>
- [patch] crypto: nx - off by one bug in nx_of_update_msc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: rsa-pkcs1pad - Fix akcipher request allocation
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [RFC PATCH] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: rsa-pkcs1pad - Fix akcipher request allocation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [V2][PATCH 2/2] pefile: Fix the failure of calculation for digest
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [V2][PATCH 1/2] PKCS#7: Fix kernel panic when referring to the empty AuthorityKeyIdentifier
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: img-hash - Fix hash request context
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- Re: [PATCH 5/6] crypto: img-hash - Add support for export and import
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: "Alastair D'Silva" <alastair@xxxxxxxxxxx>
- [PATCH 2/2] Automatically load the vmx_crypto module if supported.
- From: alastair@xxxxxxxxxxx
- [PATCH 0/2] Automatically load the vmx_crypto module if supported
- From: alastair@xxxxxxxxxxx
- [PATCH 1/2] powerpc: Add module autoloading based on CPU features
- From: alastair@xxxxxxxxxxx
- [PATCH 2/2] crypto: vmx - Convert to CPU feature based module autoloading
- From: alastair@xxxxxxxxxxx
- [PATCH 1/2] Allow drivers to be autoloaded.
- From: alastair@xxxxxxxxxxx
- Re: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Stewart Smith <stewart@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: David Laight <David.Laight@xxxxxxxxxx>
- [RFC PATCH] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] crypto: img-hash - Add support for export and import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] crypto: img-hash - Fix hash request context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: img-hash - Fix null pointer exception
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/30] crypto: scatterwalk - Add no-copy support to copychunks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 30/30] crypto: lrw - Convert to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 29/30] crypto: aes-ce-ccm - Use skcipher walk interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 28/30] crypto: skcipher - Add skcipher walk interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 27/30] crypto: scatterwalk - Inline start/map/done
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/30] crypto: scatterwalk - Remove unnecessary advance in scatterwalk_pagedone
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/30] crypto: scatterwalk - Remove unnecessary BUG in scatterwalk_start
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/30] crypto: scatterwalk - Fix test in scatterwalk_done
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/30] crypto: api - Optimise away crypto_yield when hard preemption is on
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/30] crypto: scatterwalk - Remove scatterwalk_bytes_sglen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/30] crypto: omap - Stop using crypto scatterwalk_bytes_sglen
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/30] crypto: simd - Add simd skcipher helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/30] crypto: skcipher - Remove top-level givcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/30] crypto: cts - Convert to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/30] crypto: user - Remove crypto_lookup_skcipher call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/30] crypto: null - Remove default null blkcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/30] crypto: cryptd - Add support for skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/30] crypto: aead - Remove blkcipher null for IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/30] crypto: seqiv - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/30] crypto: gcm - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/30] crypto: echainiv - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/30] crypto: aead - Add skcipher null for IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/30] crypto: chacha20poly1305 - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/30] crypto: ccm - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/30] crypto: ctr - Use skcipher in rfc3686
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/30] crypto: authencesn - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/30] crypto: authenc - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/30] crypto: aead - Add chunk size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/30] crypto: null - Add new default null skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/30] crypto: skcipher - Add low-level skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/30] crypto: skcipher - skcipher algorithm conversion part 2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: vmx - Adding support for XTS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: vmx - Adding support for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: vmx - Adding asm subroutines for XTS
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 0/3] crypto/chcr: Add Chelsio Crypto Driver
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [PATCH 1/3] cxgb4: Add Chelsio LLD support Chelsio Crypto ULD
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [PATCH 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- [PATCH 3/3] crypto: Added Chelsio Menu to the Kconfig file
- From: Yeshaswi M R Gowda <yeshaswi@xxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Stop dropping leading zeros from RSA output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [linux-next] crypto: doc- Fix double words "the the" in crypto-API.tmpl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Add DH support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: img-hash - Reconfigure DMA Burst length
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 1/6] crypto: img-hash - Fix null pointer exception
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 6/6] crypto: img-hash - log a successful probe
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 5/6] crypto: img-hash - Add support for export and import
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 4/6] crypto: img-hash - Add suspend resume hooks for img hash
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 2/6] crypto: img-hash - Fix hash request context
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH 0/6] crypto: img-hash - fixes and interface changes
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Stop dropping leading zeros from RSA output
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH] crypto: qat - Add DH support
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH] [linux-next] crypto: doc- Fix double words "the the" in crypto-API.tmpl
- From: Masanari Iida <standby24x7@xxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: DH & KDF
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: DH & KDF
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: AEAD: Having separate underlying cipher handle for each request
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: AEAD: Having separate underlying cipher handle for each request
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- Re: AEAD: Having separate underlying cipher handle for each request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: AEAD: Having separate underlying cipher handle for each request
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/3] Add RSA CRT mode to qat driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bfin_crc: Simplify use of devm_ioremap_resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v10 PATCH] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr - Set err before proceeding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - Switch to new rsa_helper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: powerpc: Add POWER8 optimised crc32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- AEAD: Having separate underlying cipher handle for each request
- From: Ondrej Mosnáček <omosnacek@xxxxxxxxx>
- RE: [PATCH] Enable slice hang handling for C3X and C6X devices.
- From: "Mcloughlin, Conor" <conor.mcloughlin@xxxxxxxxx>
- [PATCH] Enable slice hang handling for C3X and C6X devices.
- From: Conor McLoughlin <conor.mcloughlin@xxxxxxxxx>
- RE: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: Why null skcipher to copy AAD data?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Cristian Stoica <cristian.stoica@xxxxxxx>
- [PATCH 3/3] crypto: qat - Add RSA CRT mode
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 2/3] crypto: testmgr - Add 4K private key to RSA testvector
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 1/3] crypto: rsa - Store rest of the private key components
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 0/3] Add RSA CRT mode to qat driver
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH] Use alternative reset methods depending on the specific device.
- From: Conor McLoughlin <conor.mcloughlin@xxxxxxxxx>
- RE: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] crypto: bfin_crc: Simplify use of devm_ioremap_resource
- From: Amitoj Kaur Chawla <amitoj1606@xxxxxxxxx>
- Why null skcipher to copy AAD data?
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [v10 PATCH] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] crypto: testmgr - Set err before proceeding
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v2] crypto: qat - Switch to new rsa_helper functions
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: powerpc: Add POWER8 optimised crc32c
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v4 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] Crypto:Add HMAC-SHA3 test modes and test vectors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham - increase cra_proirity to 400
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v4 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- DH & KDF
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [v4 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [v4 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [cryptodev:master 118/131] arch/s390/crypto/aes_s390.c:271:1: warning: 'fallback_blk_dec' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 116/131] drivers/crypto/qce/ablkcipher.c:229:1: warning: 'qce_ablkcipher_crypt' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [v9 PATCH] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [RFC] WireGuard: next generation secure network tunnel
- From: Matthias Urlichs <matthias@xxxxxxxxxx>
- Re: [RFC] WireGuard: next generation secure network tunnel
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC] WireGuard: next generation secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC] WireGuard: next generation secure network tunnel
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Switch to new rsa_helper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: powerpc: Add POWER8 optimised crc32c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - make qat_asym_algs.o depend on asn1 headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] Crypto:Add HMAC-SHA3 test modes and test vectors
- From: Raveendra Padasalagi <raveendra.padasalagi@xxxxxxxxxxxx>
- [PATCH 2/2] crypto: powerpc: Add POWER8 optimised crc32c
- From: Anton Blanchard <anton@xxxxxxxxxx>
- [PATCH 1/2] powerpc: define FUNC_START/FUNC_END
- From: Anton Blanchard <anton@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v2] crypto: omap-sham - increase cra_proirity to 400
- From: Bin Liu <b-liu@xxxxxx>
- Re: crypto: tcrypt - Do not bail on EINPROGRESS in multibuffer hash test
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Switch to new rsa_helper functions
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- kexec_file_load signature verification failure
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: walter harms <wharms@xxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] crypto: qat - make qat_asym_algs.o depend on asn1 headers
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] crypto: omap-sham - increase cra_proirity to 400
- From: Tero Kristo <t-kristo@xxxxxx>
- crypto: tcrypt - Do not bail on EINPROGRESS in multibuffer hash test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- Re: [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [patch V4 30/31] crypto: use parity_long in sahara.c
- From: zengzhaoxiu@xxxxxxx
- [PATCH] crypto: omap-sham - increase cra_proirity to 400
- From: Bin Liu <b-liu@xxxxxx>
- [patch] crypto: sha1-mb - cleanup a small | vs || typo
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch] crypto: sha256-mb - cleanup a || vs | typo
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [patch] crypto: tcrypt - add a missing tab
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [patch] crypto: tcrypt - add a missing tab
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 8/8] crypto: rsa-pkcs1pad - Avoid copying output when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 7/8] crypto: rsa-pkcs1pad - Move key size check to setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 6/8] crypto: rsa-pkcs1pad - Always use GFP_KERNEL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 5/8] crypto: rsa-pkcs1pad - Remove bogus page splitting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 4/8] crypto: rsa-pkcs1pad - Require hash to be present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 3/8] lib/mpi: Do not do sg_virt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 2/8] crypto: rsa - Generate fixed-length output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 1/8] crypto: testmgr - Allow leading zeros in RSA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH 2/8] crypto: rsa - Generate fixed-length output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [v3 PATCH 2/8] crypto: rsa - Generate fixed-length output
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- [v3 PATCH 8/8] crypto: rsa-pkcs1pad - Avoid copying output when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 7/8] crypto: rsa-pkcs1pad - Move key size check to setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 6/8] crypto: rsa-pkcs1pad - Always use GFP_KERNEL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 5/8] crypto: rsa-pkcs1pad - Remove bogus page splitting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 4/8] crypto: rsa-pkcs1pad - Require hash to be present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 2/8] crypto: rsa - Generate fixed-length output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 3/8] lib/mpi: Do not do sg_virt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 1/8] crypto: testmgr - Allow leading zeros in RSA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 0/8] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Remove redundant sg_init_table call.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 27/28] crypto: tcrypt - Add speed test for cts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/28] crypto: aead - Add skcipher null for IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/28] crypto: seqiv - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 28/28] crypto: cts - Convert to skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/28] crypto: api - Add crypto_inst_setname
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/28] crypto: aead - Remove blkcipher null for IV generators
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/28] crypto: null - Remove default null blkcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/28] crypto: echainiv - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/28] crypto: s390/aes - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/28] crypto: sahara - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/28] crypto: qce - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/28] crypto: picoxcell - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/28] crypto: mxs-dcp - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/28] KEYS: Use skcipher for big keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/28] crypto: ccp - Use skcipher for fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/28] crypto: cryptd - Add support for skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/28] crypto: aesni - Use crypto_cipher to derive rfc4106 subkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/28] crypto: chacha20poly1305 - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/28] crypto: gcm - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/28] crypto: ccm - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/28] crypto: ctr - Use skcipher in rfc3686
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/28] crypto: authencesn - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/28] crypto: authenc - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/28] crypto: tcrypt - Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/28] crypto: null - Add new default null skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/28] crypto: skcipher - Add low-level skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/28] crypto: ahash - Add padding in crypto_ahash_extsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/28] crypto: authenc - Consider ahash ASYNC bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/28] crypto: skcipher - skcipher algorithm conversion part 1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 1/7] crypto: rsa - Generate fixed-length output
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 2/7] lib/mpi: Do not do sg_virt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 7/7] crypto: rsa-pkcs1pad - Avoid copying output when possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 3/7] crypto: rsa-pkcs1pad - Require hash to be present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 6/7] crypto: rsa-pkcs1pad - Move key size check to setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 5/7] crypto: rsa-pkcs1pad - Always use GFP_KERNEL
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 4/7] crypto: rsa-pkcs1pad - Remove bogus page splitting
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 0/7] crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH v2] crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Remove redundant sg_init_table call.
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [RFC] WireGuard: next generation secure network tunnel
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: "George Spelvin" <linux@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- crypto: tcrypt - Fix memory leaks/crashes in multibuffer hash speed test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: tcrypt: Fix linkage error on ARM on division of s64
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: tcrypt: Fix linkage error on ARM on division of s64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: tcrypt: Fix mixing printk/pr_err and obvious indentation issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] crypto: SHA512 multibuffer implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: do not build with -O0
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/8] crypto: add driver-side scomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/8] crypto: add driver-side scomp interface
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/2] crypto: tcrypt: Fix mixing printk/pr_err and obvious indentation issues
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 2/2] crypto: tcrypt: Fix linkage error on ARM on division of s64
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 94/97] ERROR: "__aeabi_ldivmod" [crypto/tcrypt.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 3/3] ARM: dts: BCM5301x: Add RNG Device Tree node
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 2/6] crypto: sha512-mb - Enable SHA512 multibuffer support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 1/6] crypto: sha512-mb - SHA512 multibuffer job manager and glue code
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 6/6] crypto: tcrypt - Add new mode for sha512_mb
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 4/6] crypto: sha512-mb - Algorithm data structures
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 3/6] crypto: sha512-mb - submit/flush routines for AVX2
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 5/6] crypto: sha512-mb - Crypto computation (x4 AVX2)
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 0/6] crypto: SHA512 multibuffer implementation
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [cryptodev:master 94/97] ERROR: "__divdi3" [crypto/tcrypt.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: ux500: do not build with -O0
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V2] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] crypto: SHA256 multibuffer implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update maintainer for qat
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: bindings: Add BCM5301x binding
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 05/27] crypto: omap-sham: avoid executing tasklet where not needed
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH 7/7] random: add backtracking protection to the CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 5/7] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 5/7] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 7/7] random: add backtracking protection to the CRNG
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 5/7] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Pavel Machek <pavel@xxxxxx>
- [cryptodev:master 87/87] crypto/ecc.c:1018:1: warning: 'crypto_ecdh_shared_secret' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 84/87] security/keys/big_key.c:118:1: warning: 'big_key_crypt' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [cryptodev:master 79/87] crypto/ecc.c:532:1: warning: 'vli_mmod_fast' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 2/3] hw_random: bcm2835: Add support for Broadcom BCM5301x
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Nishanth Menon <nm@xxxxxx>
- [PATCH V2] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Nishanth Menon <nm@xxxxxx>
- [PATCH] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Nishanth Menon <nm@xxxxxx>
- Re: [PATCH] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Nishanth Menon <nm@xxxxxx>
- Re: [PATCH] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Suman Anna <s-anna@xxxxxx>
- [PATCH] hwrng: OMAP: Fix assumption that runtime_get_sync will always succeed
- From: Nishanth Menon <nm@xxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update maintainer for qat
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 2/3] hw_random: bcm2835: Add support for Broadcom BCM5301x
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Jitter RNG - use ktime_get_ns as fallback
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 01/27] crypto: omap-sham: use runtime_pm autosuspend for clock handling
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Encryption output buffer description in algif_aead.c file
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- [PATCH v5] Bluetooth: convert smp and selftest to crypto kpp API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: Encryption output buffer description in algif_aead.c file
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Encryption output buffer description in algif_aead.c file
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: Encryption output buffer description in algif_aead.c file
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Encryption output buffer description in algif_aead.c file
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: [PATCHv2 06/27] crypto: ahash: increase the maximum allowed statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2 05/27] crypto: omap-sham: avoid executing tasklet where not needed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/8] crypto: add driver-side scomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- linux-next: build failure after merge of the crypto tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: Fix IPsec reordering caused by cryptd
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/8] crypto: add driver-side scomp interface
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 0/5] crypto: Fix IPsec reordering caused by cryptd
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] crypto: algif - add akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 2/7] crypto: sha256-mb - Enable multibuffer support
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 1/7] crypto: sha256-mb - SHA256 multibuffer job manager and glue code
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 4/7] crypto: sha256-mb - Algorithm data structures
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 3/7] crypto: sha256-mb - submit/flush routines for AVX2
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 5/7] crypto: sha256-mb - Crypto computation (x8 AVX2)
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 6/7] crypto: tcrypt - Add speed tests for SHA multibuffer algorithms
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 7/7] crypto: sha1-mb - rename sha-mb to sha1-mb
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 0/7] crypto: SHA256 multibuffer implementation
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: user - re-add size check for CRYPTO_MSG_GETALG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/6] crypto: algif_akcipher - add ops_nokey
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 2/6] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 4/6] crypto: algif_akcipher - enable compilation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 1/6] crypto: AF_ALG -- add sign/verify API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v8 0/6] crypto: algif - add akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [cryptodev:master 79/79] (.text+0x330de0): multiple definition of `ecdh_shared_secret'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: crypto: rsa - Do not gratuitously drop leading zeroes
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] crypto: user - re-add size check for CRYPTO_MSG_GETALG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/8] KEYS: keyctl operations for asymmetric keys [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/8] KEYS: Provide missing asymmetric key subops for new key type ops [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/8] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/8] KEYS: Allow the public_key struct to hold a private key [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/8] KEYS: Provide software public key query function [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 7/8] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/8] KEYS: Provide key type operations for asymmetric key ops [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/8] KEYS: keyctl operations for asymmetric keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 2/8] crypto: add driver-side scomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto : async implementation for sha1-mb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] crypto: marvell: Check engine is not already running when enabling a req
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - re-add size check for CRYPTO_MSG_GETALG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCHv2 00/27] crypto: fixes for omap family of devices
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] crypto: rsa-pkcs1pad - Require hash to be present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] hw_random: bcm2835: Add support for Broadcom BCM5301x
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH 3/3] ARM: dts: BCM5301x: Add RNG Device Tree node
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 2/3] hw_random: bcm2835: Add support for Broadcom BCM5301x
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 1/3] Documentation: devicetree: bindings: Add BCM5301x binding
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH 0/3] hw_random: bcm2835: Add support for Broadcom BCM5301x
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: Doing crypto in small stack buffers (bluetooth vs vmalloc-stack crash, etc)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [Y2038] [PATCH v2] crypto: Jitter RNG - use ktime_get_ns as fallback
- From: Arnd Bergmann <arnd@xxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]