Linux Crypto
[Prev Page][Next Page]
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Pack cfg ctl structs
- From: Ahsan Atta <ahsan.atta@xxxxxxxxx>
- Re: [RFC PATCH 0/2] Crypto kernel TLS socket
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: skcipher - Add crypto_skcipher_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Use memcpy_toio for iomem annotated memory
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: zain <zain.wang@xxxxxxxxxxxxxx>
- Crypto Update for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <wzz@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- linux kernel (sparc), n2 rng for newer hardware
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: algif_hash bug?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: hash - Add crypto_ahash_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RESEND PATCH 1/2] crypto: sunxi-ss-cipher: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 2/2] crypto: sunxi-ss-hash: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Kexec_file_load failed with "Missing required AuthAttr"
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V3] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH V2] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove redundant function call
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - change name for c6xx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ANSI X9.31 DRNG is not allowed in FIPS 140-2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH RFC 2/7] crypto/compress: introduce sychronuous compression API
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 1/7] crypto/compress: remove unused pcomp interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 3/7] crypto: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 6/7] crypto/compress: add algorithm type specific flag, DECOMP_NOCTX
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 7/7] crypto/lzo: add CRYPTO_ALG_SCOMPRESS_DECOMP_NOCTX cra_flags
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 5/7] crypto: testmgr: add scompress/acompress test
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 4/7] crypto/lzo: support SCOMPRESS alg type
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- next-20151231 - aes crypto algorithm went missing?
- From: Valdis Kletnieks <Valdis.Kletnieks@xxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in rng_recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- crypto: deadlock in alg_setsockopt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Geliang Tang <geliangtang@xxxxxxx>
- crypto: use-after-free in rng_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/3] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/3] crypto: public_key: remove MPIs from public_key_signature struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [PATCH] crypto: 842 - remove WARN inside printk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v3 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: André Przywara <andre.przywara@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix some timeout tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: bad page state due to PF_ALG socket
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: use-after-free in skcipher_sock_destruct
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: 842 - remove WARN inside printk
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: [PATCH] Renaming dh895xcc mmp fw
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- ahash alg that does not implement import/export failed to register
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: AF_ALG -- add asymmetric cipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: algif_akcipher - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: AF_ALG -- add sign/verify API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 20/24] crypto: atmel-aes: fix atmel-ctr-aes driver for RFC 3686
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 23/24] crypto: atmel-aes: add support to GCM mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 24/24] crypto: atmel-aes: add debug facilities to monitor register accesses.
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 21/24] crypto: atmel-aes: fix the counter overflow in CTR mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 22/24] crypto: atmel-aes: change the DMA threshold
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 19/24] crypto: atmel-aes: create sections to regroup functions by usage
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 18/24] crypto: atmel-aes: fix typo and indentation
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 17/24] crypto: atmel-aes: use SIZE_IN_WORDS() helper macro
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 16/24] crypto: atmel-aes: improve performances of data transfer
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 01/24] crypto: atmel-aes: add new version
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 02/24] crypto: atmel-aes: constify value argument of atmel_aes_write_n()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 13/24] crypto: atmel-aes: reduce latency of DMA completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 15/24] crypto: atmel-aes: fix atmel_aes_remove()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 14/24] crypto: atmel-aes: remove useless AES_FLAGS_DMA flag
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 12/24] crypto: atmel-aes: remove unused 'err' member of struct atmel_aes_dev
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 09/24] crypto: atmel-aes: remove useless write in the Control Register
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 11/24] crypto: atmel-aes: rework crypto request completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 10/24] crypto: atmel-aes: simplify the configuration of the AES IP
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 04/24] crypto: atmel-aes: fix unregistration order of crypto algorithms
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 08/24] crypto: atmel-aes: make crypto request queue management more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 05/24] crypto: atmel-aes: remove unused header includes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 06/24] crypto: atmel-aes: propagate error from atmel_aes_hw_version_init()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 07/24] crypto: atmel-aes: change atmel_aes_write_ctrl() signature
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 03/24] crypto: atmel-aes: change algorithm priorities
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- GPF in gf128mul_64k_bbe
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- bad page state due to PF_ALG socket
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in skcipher_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- RE: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: "Yang, Pingchao" <pingchao.yang@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: walter harms <wharms@xxxxxx>
- [PATCH] crypto: qat - fix some timeout tests
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: add algif_akcipher user space API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - enable VF irq after guest exits ungracefully
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- [PATCH 2/2] crypto: omap-aes,omap-des: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Fabrizio Demaria <fabrizio.f.demaria@xxxxxxxxx>
- [RFC PATCH V4] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] keys, trusted: select hash algorithm for TPM2 chips
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] TPM 2.0 trusted key features for v4.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys/signature.c does not need <module.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - select PCI_IOV when VF are enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - ring returning retry even though ring has BW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara: fix 64-bit dma_addr_t compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: constify drbg_state_ops structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: crypto: qat - add support for new devices to FW loader
- From: "Yang, Pingchao" <pingchao.yang@xxxxxxxxx>
- [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- re: crypto: qat - add support for new devices to FW loader
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 50/54] adf_c3xxxvf_hw_data.c:undefined reference to `adf_iov_putmsg'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Sam Protsenko <semen.protsenko@xxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Semen Protsenko <semen.protsenko@xxxxxxxxxx>
- "crypto_hash_setkey" call from atomic context
- From: Fabrizio Demaria <fabrizio.f.demaria@xxxxxxxxx>
- [PATCH v2] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [cryptodev:master 53/54] crypto/rsa-pkcs1pad.c:135:1: warning: 'pkcs1pad_encrypt_sign_complete' uses dynamic stack allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 50/54] adf_c3xxxvf_hw_data.c:undefined reference to `adf_iov_putmsg'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: asymmetric_keys/signature.c does not need <module.h>
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - select PCI_IOV when VF are enabled
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - ring returning retry even though ring has BW
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 53/54] crypto/rsa-pkcs1pad.c:135:1: warning: 'pkcs1pad_encrypt_sign_complete' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [cryptodev:master 51/54] drivers/crypto/qat/qat_c62xvf/adf_drv.c:116:57: error: 'struct pci_dev' has no member named 'physfn'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] chacha20poly1305: Skip encryption/decryption for 0-len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] blkcipher: Copy iv from desc even for 0-len walks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add support for qat_c3xxx and qat_c62x devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix kernel-doc warnings in crypto/aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: fix debug output for 64-bit dma_addr_t
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: sahara: fix 64-bit dma_addr_t compilation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- WARNING in crypto_wait_for_test
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: constify drbg_state_ops structures
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Dan Streetman <ddstreet@xxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH RFC 11/11] crypto: caam: get rid of tasklet
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 09/11] crypto: caam: move job descriptor initialisation to ahash_edesc_alloc()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 08/11] crypto: caam: add ahash_edesc_alloc() for descriptor allocation
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 05/11] crypto: caam: replace sec4_sg pointer with array
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 04/11] crypto: caam: mark the hardware descriptor as cache line aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 03/11] crypto: caam: incorporate job descriptor into struct ahash_edesc
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 02/11] crypto: caam: ensure descriptor buffers are cacheline aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 01/11] crypto: caam: fix DMA API mapping leak
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 00/13] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Daniel Axtens <dja@xxxxxxxxxx>
- crypto/nx842: Ignore queue overflow informative error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] chacha20poly1305: Skip encryption/decryption for 0-len
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] blkcipher: Copy iv from desc even for 0-len walks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v7 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v7 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: qat - add support for c62xvf accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 6/7] crypto: qat - add support for c3xxxvf accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 4/7] crypto: qat - add support for c3xxx accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 5/7] crypto: qat - add support for c62x accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/7] crypto: qat - move isr files to qat common so that they can be reused
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/7] crypto: qat - add support for new devices to FW loader
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/7] crypto: qat - add new device definitions
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/7] Add support for qat_c3xxx and qat_c62x devices
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: talitos - add new crypto modes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] IV size failing on skcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - pass the correct buffer length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: Fix driver load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: rockchip/crypto - fix possible deadlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hw_random: core, sleep interruptible in read
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] crypto: fix kernel-doc warnings in crypto/aead.h
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- Re: ipsec impact on performance
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: AES CBC multi-buffer scheduler
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 4/5] crypto: AES CBC by8 encryption
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/5] crypto: AES CBC multi-buffer data structures
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/5] crypto: x86 AES-CBC encryption with multibuffer
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [RFC] KEYS: Exposing {a,}symmetric key ops to userspace and other bits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- RE: ipsec impact on performance
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: ipsec impact on performance
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Ahern <dsa@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Ahern <dsa@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- [PATCH RFC] Defer xfrm to be done post-GSO
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - add new crypto modes
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 2/2] Removing VRSAVE save and restore
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] IV size failing on skcipher API
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - pass the correct buffer length
- From: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- [PATCH 1/2] crypto: ghash-clmulni - Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH 2/2] crypto: cryptd - Assign statesize properly
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH 0/2] crypto: Fix driver load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v6 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v2] crypto: rockchip/crypto - fix possible deadlock
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH] crypto: rockchip/crypto - fix possible deadlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rockchip/crypto - fix possible deadlock
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v5 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v2] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto/cryptod: use crypto_skcipher_type() for getting skcipher type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: core, sleep interruptible in read
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ahash and halg.statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx>
- ahash and halg.statesize
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Marek Vasut <marex@xxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- mxs-dcp: Failed to register sha1 hash
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: ghash-clmulni: does not load
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- ghash-clmulni: does not load
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] updating for keypayload null check.
- From: Ameen <ameenali023@xxxxxxxxx>
- [PATCH] crypto/cryptod: use crypto_skcipher_type() for getting skcipher type
- From: Alexander Kuleshov <kuleshovmail@xxxxxxxxx>
- [PATCH v4 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 2/4] crypto: rsa: only require output buffers as big as needed.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v5 0/4] crypto: add crypto accelerator support for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Phil Sutter <phil@xxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] Crypto support aesni rfc5288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/crypto/qat/qat_common/Makefile: fix typo in clean-files
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: padlock-aes - use offset_in_page macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: nx: use of_property_read_u32()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] clk: rockchip: set an ID for crypto clk
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] Crypto kernel TLS socket
- From: Hannes Frederic Sowa <hannes@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] Crypto support aesni rfc5288
- From: Dave Watson <davejwatson@xxxxxx>
- [RFC PATCH 2/2] Crypto kernel tls socket
- From: Dave Watson <davejwatson@xxxxxx>
- [RFC PATCH 0/2] Crypto kernel TLS socket
- From: Dave Watson <davejwatson@xxxxxx>
- Re: [PATCH] crypto: nx: use of_property_read_u32()
- From: Dan Streetman <ddstreet@xxxxxxxx>
- Re: [PATCH v3] crypto: atmel: fix bogus select
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara: set nb_[in|out]_sg as signed int
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hw_random: omap3-rom-rng: convert timer to delayed work
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] crypto: tcrypt: fix keysize argument of test_aead_speed for gcm(aes)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: fix 64-bit warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: mcryptd - use list_first_entry_or_null()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: api - use list_first_entry_or_null and list_next_entry
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: hwrng: Some concerns about add_hwgenerator_randomness
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Docs blurb about templates.
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Docs blurb about templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH] crypto: nx: use of_property_read_u32()
- From: Saurabh Sengar <saurabh.truth@xxxxxxxxx>
- Re: [RFC] KEYS: Exposing {a,}symmetric key ops to userspace and other bits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- hwrng: Some concerns about add_hwgenerator_randomness
- From: Nick Kossifidis <mickflemm@xxxxxxxxx>
- [PATCH] crypto: padlock-aes - use offset_in_page macro
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [RFC] KEYS: Exposing {a,}symmetric key ops to userspace and other bits
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- [PATCH v2 0/2] fix a possible NULL dereference
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH] crypto: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH] crypto: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: add asynchronous compression support
- From: "Joonsoo Kim" <iamjoonsoo.kim@xxxxxxx>
- [PATCH 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v3 2/4] crypto: rsa: only require output buffers as big as needed.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v3 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH] drivers/crypto/qat/qat_common/Makefile: fix typo in clean-files
- From: Jim Davis <jim.epost@xxxxxxxxx>
- [PATCH v3 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/5] crypto: AES CBC multi-buffer data structures
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 4/5] crypto: AES CBC by8 encryption
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 3/5] crypto: AES CBC multi-buffer scheduler
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/5] crypto: x86 AES-CBC encryption with multibuffer
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: picoxcell: set [src|dst]_nents and nents as signed int
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] crypto: sahara: set nb_[in|out]_sg as signed int
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [PATCH] crypto: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: sahara - check return value of sg_nents_for_len
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- RE: [PATCH] crypto: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- re: crypto: sahara - check return value of sg_nents_for_len
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3] crypto: atmel: fix bogus select
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2] hw_random: omap3-rom-rng: convert timer to delayed work
- From: Aaro Koskinen <aaro.koskinen@xxxxxx>
- Re: A new, fast and "unbreakable" encryption algorithm
- From: Ismail Kizir <ikizir@xxxxxxxxx>
- Re: A new, fast and "unbreakable" encryption algorithm
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH v3] crypto: atmel: fix bogus select
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] crypto: atmel: fix bogus select
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH v3] crypto: atmel: fix bogus select
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 02/13] dmaengine: Introduce dma_request_slave_channel_compat_reason()
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: crypto-ixp4xx: Deletion of a few unnecessary checks
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- A new, fast and "unbreakable" encryption algorithm
- From: Ismail Kizir <ikizir@xxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: akcipher: add crypto_akcipher_type methods needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] crypto-ixp4xx: Deletion of a few unnecessary checks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: add missing statesize
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 3/4] crypto: akcipher: add crypto_akcipher_type methods needed by templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH] nx-842: Ignore bit 3 of condition register returned by icswx
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH 1/2] keys, trusted: select hash algorithm for TPM2 chips
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/2] TPM 2.0 trusted key features for v4.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] crypto-ixp4xx: Less function calls in init_ixp_crypto() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto-ixp4xx: Reduce assignment for a variable in init_ixp_crypto()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto-ixp4xx: Delete unnecessary checks before the function call "dma_pool_destroy"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] crypto-ixp4xx: Deletion of a few unnecessary checks
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: add missing statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: add missing statesize
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/4] crypto-ixp4xx: Delete unnecessary checks before the function call "dma_pool_destroy"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: add missing statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/9] crypto: constify pci_error_handlers structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] crypto: marvell: check return value of sg_nents_for_len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - when stopping all devices make fure VF are stopped first
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/11] crypto: algif: Change some variable to size_t
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove superfluous check from adf_probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto: hifn_795x: remove the hifn_test function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix get instance function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] nx-842: Ignore bit 3 of condition register returned by icswx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto-ixp4xx: Reduce assignment for a variable in init_ixp_crypto()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] crypto-ixp4xx: Two function calls less in init_ixp_crypto() after error detection
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: akcipher: add crypto_akcipher_type methods needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: omap3-rom-rng: convert timer to delayed work
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] crypto: Multi-buffer encryptioin infrastructure support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] crypto: tcrypt: fix keysize argument of test_aead_speed for gcm(aes)
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH] crypto: atmel: fix 64-bit warnings
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH 1/4] crypto: hifn_795x: replace simple_strtoul by kstrtouint
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] crypto: testmgr: Use the xxx_zero_message_hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] crypto: akcipher: the key parameter must be const u8 *
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/8] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: atmel: fix 64-bit warnings
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v4 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v4 0/4] crypto: add crypto accelerator support for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v4 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v4 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v4 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: api - use list_first_entry_or_null and list_next_entry
- From: Geliang Tang <geliangtang@xxxxxxx>
- [PATCH 2/2] crypto: mcryptd - use list_first_entry_or_null()
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [PATCH 0/2] Timing leaks in certain HW-crypto drivers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- [PATCH v2 3/3] Crypto: Add support for APM X-Gene SoC CRC32C h/w accelerator driver
- [PATCH v2 2/3] dmaengine: xgene-dma: Add support for CRC32C computations via DMA engine
- [PATCH v2 1/3] dmaengine: Add support for new feature CRC32C computations
- [PATCH v2] crypto: sun4i-ss: add missing statesize
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2] crypto: sun4i-ss: add missing statesize
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH 4/4] crypto-ixp4xx: Less function calls in init_ixp_crypto() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto-ixp4xx: Reduce assignment for a variable in init_ixp_crypto()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto-ixp4xx: Two function calls less in init_ixp_crypto() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] crypto-ixp4xx: Delete unnecessary checks before the function call "dma_pool_destroy"
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] crypto-ixp4xx: Deletion of a few unnecessary checks
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: talitos - Fix timing leak in ESP ICV verification
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH 1/2] crypto: nx - Fix timing leak in GCM and CCM decryption
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH 0/2] Timing leaks in certain HW-crypto drivers
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- [PATCH 0/9] constify pci_error_handlers structures
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 7/9] crypto: constify pci_error_handlers structures
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [PATCH 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH] crypto: sun4i-ss: add missing statesize
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 3/4] crypto: akcipher: add crypto_akcipher_type methods needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 2/4] crypto: rsa: only require output buffers as big as needed.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH] [RESEND] crypto: qat - don't use userspace pointer
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: RSA padding algorithm
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH v3 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH v3 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: add crypto accelerator support for rk3288
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH v3 2/4] clk: rockchip: set an ID for crypto clk
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] clk: rockchip: set an ID for crypto clk
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: add missing statesize
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: RSA padding algorithm
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: Hardware Crypto Driver
- From: Orlando <orlcp440@xxxxxxxxx>
- Re: Hardware Crypto Driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Hardware Crypto Driver
- From: Orlando <orlcp440@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: RSA padding algorithm
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 4/4] crypto: RSA padding algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v3 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v3 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v3 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v3 0/4] crypto: add crypto accelerator support for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: Hardware Crypto Driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 3/4] crypto: akcipher: add crypto_akcipher_type methods needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 2/4] crypto: rsa: only require output buffers as big as needed.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Req for mentor - [BUG]Busy luks disk not closable forever if medium is removed
- From: Andrey Utkin <andrey.od.utkin@xxxxxxxxx>
- Hardware Crypto Driver
- From: Orlando <orlcp440@xxxxxxxxx>
- Re: [PATCH 12/13] [media] omap3isp: Support for deferred probing when requesting DMA channel
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]