Linux Crypto
[Prev Page][Next Page]
- [PATCH v7 9/9] crypto: acomp - update testmgr with support for acomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v7 0/9] crypto: asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v7 5/9] crypto: acomp - add support for lz4 via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm/aes-ctr: fix NULL dereference in tail processing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: squash lines for simple wrapper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: geode-rng - Use linux/io.h instead of asm/io.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: geode-rng - Migrate to managed API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] hwrng: st - Fix missing clk_disable_unprepare() on error in st_rng_probe()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: amd-rng - Migrate to managed API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: core - Allocate memory during module init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - fix resource release omissions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: pasemi-rng - Use linux/io.h instead of asm/io.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 00/11] crypto: omap HW crypto fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: hwrng: pasemi-rng - Use linux/io.h instead of asm/io.h
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: algif_aead: AIO broken with more than one iocb
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] crypto: only call put_page on referenced and used pages
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_aead: AIO broken with more than one iocb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: only call put_page on referenced and used pages
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 3/8] hwrng: omap - Switch to non-obsolete read API implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 06/11] crypto: omap-des: Fix support for unequal lengths
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: arm64/aes-ctr: fix NULL dereference in tail processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: arm/aes-ctr: fix NULL dereference in tail processing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3] crypto: only call put_page on referenced and used pages
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: xiakaixu <xiakaixu@xxxxxxxxxx>
- Re: [PATCH] crypto: squash lines for simple wrapper functions
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] crypto: squash lines for simple wrapper functions
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Memory corruption in algif_skciper AIO sendpage with multiple iocb
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [STLinux Kernel] [PATCH -next] hwrng: st - Fix missing clk_disable_unprepare() on error in st_rng_probe()
- From: Peter Griffin <peter.griffin@xxxxxxxxxx>
- Re: [PATCH -next] hwrng: st - Fix missing clk_disable_unprepare() on error in st_rng_probe()
- From: Patrice Chotard <patrice.chotard@xxxxxx>
- RE: Kernel panic - encryption/decryption failed when open file on Arm64
- From: liushuoran <liushuoran@xxxxxxxxxx>
- [PATCH] hwrng: geode-rng - Use linux/io.h instead of asm/io.h
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] hwrng: geode-rng - Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: algif_aead: AIO broken with more than one iocb
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: algif_aead: AIO broken with more than one iocb
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- algif_aead: AIO broken with more than one iocb
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH -next] hwrng: st - Fix missing clk_disable_unprepare() on error in st_rng_probe()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- [PATCH] crypto: call put_page on used pages only
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2] crypto: only call put_page used pages
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: only call put_page used pages
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] softirq: fix tasklet_kill() and its users
- From: Santosh Shilimkar <santosh.shilimkar@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: xiakaixu <xiakaixu@xxxxxxxxxx>
- [PATCH] hwrng: amd-rng - Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: xiakaixu <xiakaixu@xxxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: BUG in recvmsg using io_submit
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: engine: fix linux-next merge conflict
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Kernel panic - encryption/decryption failed when open file on Arm64
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: rmmod crypto driver when ipsec is in use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- rmmod crypto driver when ipsec is in use
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- BUG in recvmsg using io_submit
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- BUG while working on algif_skcipher AIO support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- Re: [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [PATCH v2 7/8] hwrng: omap - Add device variant for SafeXcel IP-76 found in Armada 8K
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/8] hwrng: omap - Add support for 128-bit output of data
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] hwrng: omap - Don't prefix the probe message with OMAP
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] arm64: dts: marvell: add TRNG description for Armada 8K CP
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/8] hwrng: omap - Remove global definition of hwrng
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/8] hwrng: omap - Switch to non-obsolete read API implementation
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/8] dt-bindings: Add vendor prefix for INSIDE Secure
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/8] Add support for SafeXcel IP-76 to OMAP RNG
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/8] dt-bindings: omap-rng: Document SafeXcel IP-76 device variant
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] hwrng: core - Allocate memory during module init
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: arm/ghash: change internal cra_name to "__ghash"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mv_cesa: remove NO_IRQ reference
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hwrng: pasemi_rng.c: Migrate to managed API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - add missing release in ccp_dmaengine_register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto: arm and cryptd fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix rfc3686(ctr(aes)) IV load
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] crypto: engine: permit to enqueue ashash_request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix incorrect accelerator mask for C3X devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: hw_random: bcm2835: handle of_iomap failures in bcm2835 driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allocate memory during module init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allocate memory during module init
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] crypto: caam: add missing header dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Stanimir Varbanov <svarbanov@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allocate memory during module init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: echainiv not working as supposed to be?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- linux 3.10 crash with crypto hardware assist,
- From: "Hsieh, Che-Min" <cheminh@xxxxxxxxxxxxxxxx>
- [PATCH 13/21] padata: Convert to hotplug state machine
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: echainiv not working as supposed to be?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/9] arm64: dts: marvell: add TRNG description for Armada 8K CP
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 8/9] hwrng: omap - Add device variant for SafeXcel IP-76 found in Armada 8K
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/9] hwrng: omap - Don't prefix the probe message with OMAP
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/9] hwrng: omap - Add support for 128-bit output of data
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/9] hwrng: omap - Switch to non-obsolete read API implementation
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/9] hwrng: omap - Use the managed device resource API for registration
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/9] hwrng: omap - Remove global definition of hwrng
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/9] dt-bindings: omap-rng: Document SafeXcel IP-76 device variant
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/9] dt-bindings: Add vendor prefix for INSIDE Secure
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/9] Add support for SafeXcel IP-76 to OMAP RNG
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- echainiv not working as supposed to be?
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: qat - fix resource release omissions
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH] hwrng: pasemi-rng - Use linux/io.h instead of asm/io.h
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH][V2] s390/crypto: initialize ret to nbytes to avoid returning garbage value
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] s390/crypto: initialize ret to zero to avoid returning garbage value
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- [PATCH] s390/crypto: initialize ret to zero to avoid returning garbage value
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH] crypto: arm/ghash: change internal cra_name to "__ghash"
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm/ghash-ce - add missing async import/export
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 65/80] drivers/pci/quirks.c:843:6: error: 'struct pci_dev' has no member named 'sriov'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: algif_akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] hwrng: pasemi_rng.c: Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- algif_akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] hwrng: core - Allocate memory during module init
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [cryptodev:master 65/80] drivers/pci/quirks.c:843:6: error: 'struct pci_dev' has no member named 'sriov'
- From: Ananth Jasty <ajasty@xxxxxxxxxxxxxxxxxx>
- [cryptodev:master 65/80] drivers/pci/quirks.c:843:6: error: 'struct pci_dev' has no member named 'sriov'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: qce: Initialize core src clock @100Mhz
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- Re: Who will copy the AAD data to dest. buffer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: mv_cesa: remove NO_IRQ reference
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] dm-crypt: flush crypt_queue on suspend? on REQ_FLUSH?
- From: Eric Wheeler <dm-devel@xxxxxxxxxxxxxxxxxx>
- Re: Who will copy the AAD data to dest. buffer
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- [PATCH] crypto: caam: add missing header dependencies
- From: Baoyou Xie <baoyou.xie@xxxxxxxxxx>
- [PATCH] crypto: mv_cesa: remove NO_IRQ reference
- From: Arnd Bergmann <arnd@xxxxxxxx>
- dm-crypt: flush crypt_queue on suspend? on REQ_FLUSH?
- From: Eric Wheeler <dm-devel@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: qat - fix resource release omissions
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH v2 1/2] crypto: qat - introduces a variable to handle error codes
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH v2 0/2] add omitted release in qat_common
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 0/2][RESEND] add omitted release in qat_common
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 2/2] crypto: qat - fix resource release omissions
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 1/2][RESEND] crypto: qat - introduces a variable to handle error codes
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- Re: Who will copy the AAD data to dest. buffer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: qat - fix resource release omissions
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - introduces a variable to handle error codes
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- [PATCH 0/2] add omitted release in qat_common
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- Who will copy the AAD data to dest. buffer
- From: Harsh Jain <harshjain.prof@xxxxxxxxx>
- Re: CONFIG_FIPS without module loading support?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] hw_random: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2 3/4] hw_random: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Paul Burton <paul.burton@xxxxxxxxxx>
- [PATCH] crypto: ccp - add missing release in ccp_dmaengine_register
- From: Quentin Lambert <lambert.quentin@xxxxxxxxx>
- bcachefs: Encryption (Posting for review)
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: CONFIG_FIPS without module loading support?
- From: NTU <neotheuser@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm/ghash-ce - add missing async import/export
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: cryptd - initialize child shash_desc on import
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: arm/ghash-ce - add missing async import/export
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/3] crypto: arm/sha1-neon - add support for building in Thumb2 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/3] crypto: arm and cryptd fixes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: arm/ghash-ce - add missing async import/export
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC PATCH] crypto: caam - convert from ablkcipher -> skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG zero-size hash fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: hwrng: pasemi_rng.c: Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: CONFIG_FIPS without module loading support?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- CONFIG_FIPS without module loading support?
- From: NTU <neotheuser@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix constants table DMA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use devm_hwrng_register instead of hwrng_register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: Remove check for max less than 4 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fix:caam:ctrl:add missing header dependencies
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] hwrng: amd: rework of the amd hwrng driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: FIPS - allow tests to be disabled in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] HWRNG/PCI: Add driver for Cavium Thunder RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hide unused label
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] crypto: arm/ghash-ce - add missing async import/export
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: hide unused label
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - fix rfc3686(ctr(aes)) IV load
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: hwrng: pasemi_rng.c: Migrate to managed API
- From: Darren Stevens <darren@xxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] crypto: engine: permit to enqueue ashash_request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 1/2] crypto: move crypto engine to its own header
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 0/2] crypto: engine: permit to enqueue ashash_request
- From: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] char: hw_random: bcm2835: handle of_iomap failures in bcm2835 driver
- From: Eric Anholt <eric@xxxxxxxxxx>
- [PATCH] crypto: qat - fix incorrect accelerator mask for C3X devices
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: qce: If total text size is zero, return pre-computed digest
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/4] crypto: qce: Remove unneeded length check for scatterlist
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [PATCH 3/4] crypto: qce: Ensure QCE receives no zero-sized updates
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [PATCH 4/4] crypto: qce: If total text size is zero, return pre-computed digest
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [PATCH 2/4] crypto: qce: Avoid repeat hash finalization
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [no subject]
- From: Iaroslav Gridin <voker57@xxxxxxxxx>
- [PATCH] char: hw_random: bcm2835: handle of_iomap failures in bcm2835 driver
- From: Arvind Yadav <arvind.yadav.cs@xxxxxxxxx>
- Re: hwrng: pasemi_rng.c: Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: hwrng: pasemi_rng.c: Migrate to managed API
- From: Darren Stevens <darren@xxxxxxxxxxxxxxxx>
- [RFC PATCH] crypto: caam - convert from ablkcipher -> skcipher
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCH v2] crypto: hide unused label
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: hide unused label
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: qat - fix constants table DMA
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: arm/sha1-neon - add support for building in Thumb2 mode
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/2] crypto: arm/ghash-ce - add missing async import/export
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH v2 3/4] hw_random: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2 3/4] hw_random: jz4780-rng: Add RNG node to jz4780.dtsi
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- [PATCH] Use devm_hwrng_register instead of hwrng_register
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 4/4] hw_random: jz4780-rng: Enable hardware RNG in CI20 defconfig
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 3/4] hw_random: jz4780-rng: Add RNG node to jz4780.dtsi
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 2/4] hw_random: jz4780-rng: Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 1/4] hw_random: jz4780-rng: Add devicetree bindings for RNG in JZ4780 SoC
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2 0/4] hw_random: Add driver for Ingenic JZ4780 SoC RNG
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 6/8] hwrng: amd: Replace global variable with private struct
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] hwrng: amd: rework of the amd hwrng driver
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] hwrng: amd: Replace global variable with private struct
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: Git bisected regression for ipsec/aead
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- caam - IV source for IPsec decryption
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- [PATCH] hw_random: Remove check for max less than 4 bytes
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH v2] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Horia Geantă <horia.geanta@xxxxxxx>
- crypto: xor - Fix warning when XOR_SELECT_TEMPLATE is unset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next v2] chcr: Fix non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH -next v2] chcr: Fix non static symbol warning
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- [PATCH] crypto: caam - fix IV loading for authenc (giv)decryption
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v2 5/5] hwrng: amd: Rework of the amd768-hwrng driver
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: caam - IV source for IPsec decryption
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- caam - IV source for IPsec decryption
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- [PATCH v3 1/8] hwrng: amd: Fix style problem with blank line
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 3/8] hwrng: amd: Be consitent with the driver name
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 2/8] hwrng: amd: use the BIT macro
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 4/8] hwrng: amd: Remove asm/io.h
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 5/8] hwrng: amd: release_region must be called after hwrng_unregister
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 7/8] hwrng: amd: Access hardware via ioread32/iowrite32
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 8/8] hwrng: amd: Convert to new hwrng read() API
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 6/8] hwrng: amd: Replace global variable with private struct
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 0/8] hwrng: amd: rework of the amd hwrng driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] fix:caam:ctrl:add missing header dependencies
- From: Baoyou Xie <baoyou.xie@xxxxxxxxxx>
- Re: [PATCH v2 5/5] hwrng: amd: Rework of the amd768-hwrng driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- sha1_mb broken
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Entropy sources
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Entropy sources (was: /dev/random - a new approach)
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: Entropy sources (was: /dev/random - a new approach)
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Git bisected regression for ipsec/aead
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v2 5/5] hwrng: amd: Rework of the amd768-hwrng driver
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: pasemi_rng.c: Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] crypto: FIPS - allow tests to be disabled in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 5/5] hwrng: amd: Rework of the amd768-hwrng driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 1/5] hwrng: amd: Fix style problem with blank line
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 4/5] hwrng: amd: Remove asm/io.h
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] hwrng: pasemi_rng.c: Migrate to managed API
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/5] hwrng: amd: rework of the amd hwrng driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 3/5] hwrng: amd: Be consitent with the driver name
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/5] hwrng: amd: use the BIT macro
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] hwrng: pasemi_rng.c: Migrate to managed API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: crypto: mxs-dcp: do not call blocking ops when !TASK_RUNNING; state=1
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Git bisected regression for ipsec/aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] chcr: Fix non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Problems with cbc(aes) and do_alg0test()
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] softirq: fix tasklet_kill() and its users
- From: Santosh Shilimkar <ssantosh@xxxxxxxxxx>
- Re: [PATCH] crypto: vmx - fix null dereference in p8_aes_xts_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: amd: Be consitent with the driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: mxs-dcp: do not call blocking ops when !TASK_RUNNING; state=1
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH v2 2/2] HWRNG: thunderx: Add Cavium HWRNG driver for ThunderX SoC.
- From: David Daney <ddaney.cavm@xxxxxxxxx>
- Re: crypto: mxs-dcp: do not call blocking ops when !TASK_RUNNING; state=1
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/2] PCI: quirk fixup for cavium invalid sriov link value.
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH -next] chcr: Fix non static symbol warning
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH] crypto: FIPS - allow RSA keys >= 2048 bits
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] chcr: Fix non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: amd: Be consitent with the driver name
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: rockchip - use devm_add_action_or_reset()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxc-scc - check clk_prepare_enable() error
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: omap3-rom-rng.c: Remove obsoleted functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/xor: skip speed test if the xor function is selected automatically
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: drbg - fix error return code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next v2] crypto: sun4i-ss - fix missing unlock on error in sun4i_hash()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix aes-xts key sizes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: Improve description of the ->read() interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 linux-next] hwrng: update Freescale i.MX RNGA Random Number Generator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] hwrng: amd: Be consitent with the driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: vmx - fix null dereference in p8_aes_xts_crypt
- From: Li Zhong <zhong@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] HWRNG: thunderx: Add Cavium HWRNG driver for ThunderX SoC.
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 1/2] PCI: quirk fixup for cavium invalid sriov link value.
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] HWRNG/PCI: Add driver for Cavium Thunder RNG
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] HWRNG: thunderx: Add Cavium HWRNG driver for ThunderX SoC.
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- Problems with cbc(aes) and do_alg0test()
- From: Michael McKay <mmckay@xxxxxxxxxx>
- crypto: mxs-dcp: do not call blocking ops when !TASK_RUNNING; state=1
- From: Stefan Wahren <stefan.wahren@xxxxxxxx>
- Re: [PATCH] crypto: rockchip - use devm_add_action_or_reset()
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH] crypto: rockchip - use devm_add_action_or_reset()
- From: Sudip Mukherjee <sudipm.mukherjee@xxxxxxxxx>
- Re: [PATCH -next v2] crypto: sun4i-ss - fix missing unlock on error in sun4i_hash()
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH V2 linux-next] hwrng: update Freescale i.MX RNGA Random Number Generator
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: FIPS - allow RSA keys >= 2048 bits
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 05/28] KVM: SVM: prepare for new bit definition in nested_ctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 26/28] KVM: SVM: add KVM_SEV_DEBUG_DECRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 19/28] KVM: SVM: prepare to reserve asid for SEV guest
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 20/28] KVM: SVM: prepare for SEV guest management API support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 15/28] x86: Unroll string I/O when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 10/28] x86: Change early_ioremap to early_memremap for BOOT data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 11/28] x86: Don't decrypt trampoline area if SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 16/28] x86: Add support to determine if running with SEV enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 14/28] x86: Don't set the SME MSR bit when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 06/28] KVM: SVM: Add SEV feature definitions to KVM
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 08/28] Access BOOT related data encrypted with SEV active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 13/28] iommu/amd: AMD IOMMU support for SEV
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 02/28] kvm: svm: Add kvm_fast_pio_in support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 12/28] x86: DMA support for SEV memory encryption
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 04/28] x86: Secure Encrypted Virtualization (SEV) support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 22/28] KVM: SVM: add SEV launch start command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 18/28] crypto: add AMD Platform Security Processor driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 17/28] KVM: SVM: Enable SEV by setting the SEV_ENABLE cpu feature
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 07/28] x86: Do not encrypt memory areas if SEV is enabled
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 01/28] kvm: svm: Add support for additional SVM NPF error codes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 03/28] kvm: svm: Use the hardware provided GPA instead of page walk
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 28/28] KVM: SVM: add command to query SEV API version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 27/28] KVM: SVM: add KVM_SEV_DEBUG_ENCRYPT command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 25/28] KVM: SVM: add KVM_SEV_GUEST_STATUS command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 24/28] KVM: SVM: add SEV_LAUNCH_FINISH command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 23/28] KVM: SVM: add SEV launch update command
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [RFC PATCH v1 21/28] KVM: introduce KVM_SEV_ISSUE_CMD ioctl
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 1/2] PCI/IOV: Add function to allow Function Dependency Link override.
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH -next] chcr: Fix non static symbol warning
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH 1/2] PCI/IOV: Add function to allow Function Dependency Link override.
- From: David Daney <ddaney@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] PCI/IOV: Add function to allow Function Dependency Link override.
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH] crypto: mxc-scc - check clk_prepare_enable() error
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 6/7] random: make /dev/urandom scalable for silly userspace programs
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 6/7] random: make /dev/urandom scalable for silly userspace programs
- From: Jan Varho <jan.varho@xxxxxxxxx>
- Entropy sources (was: /dev/random - a new approach)
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: drbg - fix error return code
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] hw_random: omap3-rom-rng.c: Remove obsoleted functions
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH -next] crypto: drbg - fix error return code
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- [PATCH -next v2] crypto: sun4i-ss - fix missing unlock on error in sun4i_hash()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: marvell - Don't break chain for computable last ahash requests
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: marvell - Use an unique pool to copy results of requests
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] hwrng: thunderx: Add Cavium HWRNG driver for ThunderX SoC.
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH 0/2] hwrng/PCI/IOV: Add driver for Cavium Thunder RNG
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] hwrng: thunderx: Add Cavium HWRNG driver for ThunderX SoC.
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] PCI/IOV: Add function to allow Function Dependency Link override.
- From: Omer Khaliq <okhaliq@xxxxxxxxxxxxxxxxxx>
- Git bisected regression for ipsec/aead
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- [PATCH v5] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- [PATCH 5/5] hwrng: amd: Rework of the amd768-hwrng driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/5] hwrng: amd: Be consitent with the driver name
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/5] hwrng: amd: use the BIT macro
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/5] hwrng: amd: Fix style problem with blank line
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 4/5] hwrng: amd: Remove asm/io.h
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] crypto/xor: skip speed test if the xor function is selected automatically
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCHv3 net-next 0/4] crypto/chcr: Add support for Chelsio Crypto Driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCHv3 net-next 0/4] crypto/chcr: Add support for Chelsio Crypto Driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 net-next 3/4] chcr: Support for Chelsio's Crypto Hardware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 net-next 0/4] crypto/chcr: Add support for Chelsio Crypto Driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: fix missing unlock on error in sun4i_hash()
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH -next] crypto: fix missing unlock on error in sun4i_hash()
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- [PATCH] crypto: qat - fix aes-xts key sizes
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] hw_random: Improve description of the ->read() interface
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH 2/2] crypto: marvell - Don't break chain for computable last ahash requests
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: marvell - Use an unique pool to copy results of requests
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Improve DMA chaining for ahash requests
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- [PATCH] crypto: doc - fix documentation for bulk registration functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH] Add Ingenic JZ4780 hardware RNG driver
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- [PATCHv3 net-next 2/4] cxgb4: Register changes and fw defines for crypto
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- [PATCHv3 net-next 4/4] crypto: Added Chelsio Menu to the Kconfig file
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- [PATCHv3 net-next 3/4] chcr: Support for Chelsio's Crypto Hardware
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- [PATCHv3 net-next 1/4] cxgb4: Add support for dynamic allocation of resources for ULD
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- [PATCHv3 net-next 0/4] crypto/chcr: Add support for Chelsio Crypto Driver
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- Re: [Patch-V2 2/3] chcr: Support for Chelsio's Crypto Hardware
- From: Hariprasad Shenai <hariprasad@xxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- [PATCH V2 linux-next] hwrng: update Freescale i.MX RNGA Random Number Generator
- From: Fabian Frederick <fabf@xxxxxxxxx>
- Re: [PATCH] hwrng-PIC32: Delete unnecessary assignment for the field "owner"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix ctx pointer in sha512-mb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: DRBG: do not call drbg_instantiate in healt test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix a little typo
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix ctx pointer and digest copy in sha256-mb
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] crypto: ccp - Fix non static symbol warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] crypto: sun4i-ss: fix a few signed warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: XTS - remove test that will fail in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hwrng-PIC32: Delete unnecessary assignment for the field "owner"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "H. Peter Anvin" <hpa@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: JZ4780 RNG and entropy depletion
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- JZ4780 RNG and entropy depletion
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: fix ctx pointer in sha512-mb
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix ctx pointer and digest copy in sha256-mb
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: FIPS self test failures (kernel panic) in kernel-4.7
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: fix ctx pointer in sha512-mb
- From: Xiaodong Liu <xiaodong.liu@xxxxxxxxx>
- [PATCH] crypto: fix ctx pointer and digest copy in sha256-mb
- From: Xiaodong Liu <xiaodong.liu@xxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: XTS - remove test that will fail in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH -next] crypto: ccp - Fix non static symbol warning
- From: Wei Yongjun <weiyj.lk@xxxxxxxxx>
- FIPS self test failures (kernel panic) in kernel-4.7
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: XTS - remove test that will fail in FIPS mode
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Data type for aio_buf under X32?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- D'oh! (Re: robot build error)
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH v6 4/5] crypto: LRNG - enable compile
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 4/5] crypto: LRNG - enable compile
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH v6 4/5] crypto: LRNG - enable compile
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 1/5] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 3/5] crypto: Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 2/5] random: conditionally compile code depending on LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v6 5/5] crypto: LRNG - add ChaCha20 support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] X.509: Fix double free in x509_cert_parse().
- From: Artem Savkov <asavkov@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: miaoqing@xxxxxxxxxxxxxx
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: XTS - remove test that will fail in FIPS mode
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/6] crypto: sun4i-ss: Always use sun4i_tfm_ctx for storing pointer to dev ss
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- [cryptodev:master 17/45] drivers/crypto/ccp/ccp-dev-v5.c:838:3: error: label 'e_hwrng' used but not defined
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: sun4i-ss: fix spelling
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: CCP - build error: label 'e_hwrng' undefined
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/6] crypto: sun4i-ss: unify update/final function
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 6/6] crypto: sun4i-ss: fix indentation of two crypto alg
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: XTS - remove test that will fail in FIPS mode
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: fix a little typo
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- How best to {en,de}crypt between sk_buff and iov_iter?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/6] crypto: sun4i-ss: clean unused ss
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/6] crypto: sun4i-ss: fix a few signed warning
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [cryptodev:master 17/45] drivers/crypto/ccp/ccp-dev-v5.c:838:3: error: label 'e_hwrng' used but not defined
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v4] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: DRBG: do not call drbg_instantiate in healt test
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- [PATCH] crypto: DRBG: do not call drbg_instantiate in healt test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- FIPS mode: modprobe: ERROR: could not insert 'drbg'
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Gary R Hook <ghook@xxxxxxx>
- Re: RSA key size not allowed in FIPS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RSA key size not allowed in FIPS
- From: Tapas Sarangi <TSarangi@xxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: testmgr.h
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- testmgr.h
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH v5 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v5 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 0/7] Various fixes for the cesa driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - avoid kernel warnings on probe failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Further iMX CAAM updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] crypto: img-hash - fixes and interface changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/testmgr.c: fix !x==y confusion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Enablement of a v5 CCP
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix non-conforming comment style
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Fix a resource release omission in error handling code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: powerpc - CRYPT_CRC32C_VPMSUM should depend on ALTIVEC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Henrique de Moraes Holschuh <hmh@xxxxxxxxxx>
- Re: [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 1/4] crypto: add template handling for RNGs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] hwrng: core - Allow for multiple simultaneous active hwrng devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Various fixes for the cesa driver
- From: Thomas Petazzoni <thomas.petazzoni@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG zero-size hash fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- AF_ALG zero-size hash fails
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: marvell - Don't hardcode block size in mv_cesa_ahash_cache_req
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/7] crypto: marvell - Don't overwrite default creq->state during initialization
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/7] crypto: marvell - Update transformation context for each dequeued req
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/7] crypto: marvell: make mv_cesa_ahash_cache_req() return bool
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/7] crypto: marvell: turn mv_cesa_ahash_init() into a function returning void
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] crypto: marvell: remove unused parameter in mv_cesa_ahash_dma_add_cache()
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/7] Various fixes for the cesa driver
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/7] crypto: marvell: be explicit about destination in mv_cesa_dma_add_op()
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH 2/2] ath9k: disable RNG by default
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - avoid kernel warnings on probe failure
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ath9k: disable RNG by default
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH 2/2] ath9k: disable RNG by default
- From: miaoqing@xxxxxxxxxxxxxx
- [PATCH 1/2] ath9k: change entropy formula for easier understanding
- From: miaoqing@xxxxxxxxxxxxxx
- RE: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- [PATCH v2] crypto: powerpc - CRYPT_CRC32C_VPMSUM should depend on ALTIVEC
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: AF_ALG broken?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Further iMX CAAM updates
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: AF_ALG broken?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH 11/11] crypto: caam: get rid of tasklet
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 09/11] crypto: caam: move job descriptor initialisation to ahash_edesc_alloc()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 08/11] crypto: caam: add ahash_edesc_alloc() for descriptor allocation
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 05/11] crypto: caam: replace sec4_sg pointer with array
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 04/11] crypto: caam: mark the hardware descriptor as cache line aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 03/11] crypto: caam: incorporate job descriptor into struct ahash_edesc
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 02/11] crypto: caam: ensure descriptor buffers are cacheline aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 01/11] crypto: caam: fix DMA API mapping leak
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH 00/11] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- AF_ALG broken?
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha3 - Add missing ULL suffixes for 64-bit constants
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: caam - authenc fixes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: "Pan, Miaoqing" <miaoqing@xxxxxxxxxxxxxxxx>
- Announce loop-AES-v3.7i file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- [PATCH v3] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Jason Cooper <jason@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: img-hash - Fix set_reqsize call
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 6/7] crypto: img-hash - log a successful probe
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 5/7] crypto: img-hash - Add support for export and import
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 4/7] crypto: img-hash - Add suspend resume hooks for img hash
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 2/7] crypto: img-hash - Fix hash request context
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 3/7] crypto: img-hash - Reconfigure DMA Burst length
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 1/7] crypto: img-hash - Fix null pointer exception
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- [PATCH v2 0/7] crypto: img-hash - fixes and interface changes
- From: Will Thomas <will.thomas@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2] KEYS: add SP800-56A KDF support for DH
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v4 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/2] crypto: caam - defer aead_set_sh_desc in case of zero authsize
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - fix echainiv(authenc) encrypt shared descriptor
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - authenc fixes
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Anton Blanchard <anton@xxxxxxxxx>
- [PATCHv3 08/11] crypto: omap-aes: Add support for multiple cores
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 00/11] crypto: omap HW crypto fixes
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 06/11] crypto: omap-des: Fix support for unequal lengths
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 01/11] crypto: omap-sham: avoid executing tasklet where not needed
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 02/11] crypto: omap-sham: add support for flushing the buffer
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 04/11] crypto: omap-sham: fix software fallback handling
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 05/11] crypto: omap-sham: fix SW fallback HMAC handling for omap2/omap3
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 07/11] crypto: omap-aes: use runtime_pm autosuspend for clock handling
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 10/11] crypto: omap-aes: fix crypto engine initialization order
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 11/11] crypto: omap-des: fix crypto engine initialization order
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 09/11] crypto: omap-aes: Add fallback support
- From: Tero Kristo <t-kristo@xxxxxx>
- [PATCHv3 03/11] crypto: omap-sham: implement context export/import APIs
- From: Tero Kristo <t-kristo@xxxxxx>
- Re: [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] crypto: crc32c-vpmsum - Convert to CPU feature based module autoloading
- From: Anton Blanchard <anton@xxxxxxxxxx>
- [PATCH] crypto: sha3 - Add missing ULL suffixes for 64-bit constants
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 0020/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0127/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0130/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0129/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0128/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0100/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- [PATCH 0040/1285] Replace numeric parameter like 0444 with macro
- From: Baole Ni <baolex.ni@xxxxxxxxx>
- Crypto Fixes for 4.8
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Nicolas Brunie <nbrunie@xxxxxxxxx>
- Fwd: maxwell RNG
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- Re: [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- [PATCH] crypto/testmgr.c: fix !x==y confusion
- From: <yanjiang.jin@xxxxxxxxxxxxx>
- Re: getrandom waits for a long time when /dev/random is insufficiently read from
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- getrandom waits for a long time when /dev/random is insufficiently read from
- From: Alex Xu <alex_y_xu@xxxxxxxx>
- [GIT PULL] /dev/random driver fix for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell: Don't copy IV vectors from the _process op for ciphers
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- Re: lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Update cache with input sg only when it is unmapped
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Don't chain at DMA level when backlog is disabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell - Fix memory leaks in TDMA chain for cipher requests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- lib/mpi: BUG: sleeping function called from invalid context on next-20160726
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] DH support: add KDF handling support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/10] crypto: ccp - Enable use of the additional CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 08/10] crypto: ccp - Add support for the RNG in a version 5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 04/10] crypto: ccp - Refactor the storage block allocation code
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 06/10] crypto: ccp - Refactor code to enable checks for queue space.
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 09/10] crypto: ccp - Enable DMA service on a v5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 05/10] crypto: ccp - Refactor code supporting the CCP's RNG
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 07/10] crypto: ccp - Let a v5 CCP provide the same function as v3
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 01/10] crypto: ccp - Abstract PCI info for the CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 03/10] crypto: ccp - Refactoring: symbol cleanup
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 02/10] crypto: ccp - Shorten the fields of the action structure
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 00/10] Enablement of a v5 CCP
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH] crypto: ccp - Fix non-conforming comment style
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- a few questions on AF_ALG specification (AEAD, socket/connection, ...)
- From: Nicolas Brunie <nicolas.brunie@xxxxxxxxx>
- Re: [GIT PULL] /dev/random driver changes for 4.8
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]