Linux Crypto
[Prev Page][Next Page]
- [PATCH 3/5] lib/mpi: mpi_read_from_buffer(): return -EINVAL upon too short buffer
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH 4/5] lib/mpi: mpi_read_from_buffer(): sanitize short buffer printk
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH 5/5] lib/mpi: refactor mpi_read_from_buffer() in terms of mpi_read_raw_data()
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH 0/5] refactor mpi_read_from_buffer()
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH] KEYS: Add optional key derivation parameters for DH
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: AES-NI: slower than aes-generic?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: key retention service: DH support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: Add optional key derivation parameters for DH
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- AES-NI: slower than aes-generic?
- From: Stephan Mueller <stephan.mueller@xxxxxxxxx>
- Re: [RFC 3/3] md: dm-crypt: Introduce the bulk mode method when sending request
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- [PATCH 2/2] lib/mpi: mpi_read_raw_data(): fix nbits calculation
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH 1/2] lib/mpi: mpi_read_raw_data(): purge redundant clearing of nbits
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH] lib/mpi: purge mpi_set_buffer()
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: SKB dst field is NULL when AEAD request complete() is called
- From: Denis B <begun.denis@xxxxxxxxx>
- [PATCH] hwrng: stm32: fix maybe uninitialized variable warning
- From: Maxime Coquelin <mcoquelin.stm32@xxxxxxxxx>
- Re: SKB dst field is NULL when AEAD request complete() is called
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] crypto: AF_ALG - add support for key_id
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: booting sun sparc T5120 with "nosmp" kernel causes OOPS in n2_crypto module
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: tcrypt failing on hmac(crc32)
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: tcrypt failing on hmac(crc32)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: tcrypt failing on hmac(crc32)
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: key retention service: DH support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: key retention service: DH support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC 1/3] block: Introduce blk_bio_map_sg() to map one bio
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [RFC 1/3] block: Introduce blk_bio_map_sg() to map one bio
- From: Ming Lei <ming.lei@xxxxxxxxxxxxx>
- Re: tcrypt failing on hmac(crc32)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- tcrypt failing on hmac(crc32)
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Sudip Mukherjee <sudipm.mukherjee@xxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Sudip Mukherjee <sudipm.mukherjee@xxxxxxxxx>
- [RFC 3/3] md: dm-crypt: Introduce the bulk mode method when sending request
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [RFC 0/3] Introduce the bulk mode method when sending request to crypto layer
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [RFC 2/3] crypto: Introduce CRYPTO_ALG_BULK flag
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [RFC 1/3] block: Introduce blk_bio_map_sg() to map one bio
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- RE: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: key retention service: DH support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: key retention service: DH support
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: booting sun sparc T5120 with "nosmp" kernel 4.5.4 causes OOPS in n2_crypto module
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- SKB dst field is NULL when AEAD request complete() is called
- From: Denis B <begun.denis@xxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Maxime Coquelin <mcoquelin.stm32@xxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Maxime Coquelin <mcoquelin.stm32@xxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Maxime Coquelin <mcoquelin.stm32@xxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Maxime Coquelin <mcoquelin.stm32@xxxxxxxxx>
- Re: key retention service: DH support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: key retention service: DH support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: key retention service: DH support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: key retention service: DH support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: Northstar Plus SoC rng bindings
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH 4/4] hwrng: bcm2835: Read as much data as available
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH 2/4] hwrng: bcm2835: Support Broadcom NSP SoC rng
- From: Eric Anholt <eric@xxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: rng: Northstar Plus SoC rng bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] hwrng: stm32 - fix build warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- key retention service: DH support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] hwrng: stm32 - fix build warning
- From: Sudip Mukherjee <sudipm.mukherjee@xxxxxxxxx>
- [PATCH 1/4] dt-bindings: rng: Northstar Plus SoC rng bindings
- From: Yendapally Reddy Dhananjaya Reddy <yendapally.reddy@xxxxxxxxxxxx>
- [PATCH 4/4] hwrng: bcm2835: Read as much data as available
- From: Yendapally Reddy Dhananjaya Reddy <yendapally.reddy@xxxxxxxxxxxx>
- [PATCH 2/4] hwrng: bcm2835: Support Broadcom NSP SoC rng
- From: Yendapally Reddy Dhananjaya Reddy <yendapally.reddy@xxxxxxxxxxxx>
- [PATCH 3/4] ARM: dts: nsp: Add rng device tree entry
- From: Yendapally Reddy Dhananjaya Reddy <yendapally.reddy@xxxxxxxxxxxx>
- [PATCH 0/4] hw rng support for NSP SoC
- From: Yendapally Reddy Dhananjaya Reddy <yendapally.reddy@xxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: ccp - Fix AES XTS error for request sizes above 4096
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: ATH9K RNG
- From: "Valo, Kalle" <kvalo@xxxxxxxxxxxxxxxx>
- ATH9K RNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Announce loop-AES-v3.7h file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 14/54] MAINTAINERS: Add file patterns for crypto device tree bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 19/54] MAINTAINERS: Add file patterns for rng device tree bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 0211/1529] Fix typo
- From: Andrea Gelmini <andrea.gelmini@xxxxxxxxx>
- [PATCH 0010/1529] Fix typo
- From: Andrea Gelmini <andrea.gelmini@xxxxxxxxx>
- Re: [PATCH] crypto: ccp - Fix AES XTS error for request sizes above 4096
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: ccp - Fix AES XTS error for request sizes above 4096
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Gary R Hook <ghook@xxxxxxx>
- Re: HWCAP_CRYPTO define for ARMv8?
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Crypto Fixes for 4.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/7] crypto : async implementation for sha1-mb
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 1/7] crypto : stylistic cleanup in sha1-mb
- From: Megha Dey <megha.dey@xxxxxxxxx>
- Re: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH v6 3/3] crypto: caam - add support for RSA algorithm
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- [PATCH v3 0/8] crypto: caam - add support for LS1043A SoC
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 2/8] asm-generic/io.h: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 3/8] arm64: add io{read,write}64be accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 8/8] arm64: dts: ls1043a: add crypto node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 5/8] crypto: caam - fix offset field in hw sg entries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 7/8] crypto: caam - add ARCH_LAYERSCAPE to supported architectures
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 6/8] crypto: caam - handle core endianness != caam endianness
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 4/8] powerpc: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v3 1/8] asm-generic/io.h: allow barriers in io{read,write}{16,32}be
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v6 2/3] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v6 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v6 1/3] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v6 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Denis B <begun.denis@xxxxxxxxx>
- Re: [patch] crypto: omap-sham - potential Oops on error in probe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: public_key: select CRYPTO_AKCIPHER
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Typos and RSA
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Typos and RSA
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH] crypto: public_key: select CRYPTO_AKCIPHER2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2] crypto: public_key: select CRYPTO_AKCIPHER
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: public_key: select CRYPTO_AKCIPHER2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Denis B <begun.denis@xxxxxxxxx>
- [PATCH] crypto: public_key: select CRYPTO_AKCIPHER2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: IV generation in cryptographic driver in AEAD
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- IV generation in cryptographic driver in AEAD
- From: Denis B <begun.denis@xxxxxxxxx>
- Re: [patch] crypto: omap-sham - potential Oops on error in probe
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- Re: [patch] crypto: omap-sham - potential Oops on error in probe
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Decrypting data in RX path
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [patch] crypto: omap-sham - potential Oops on error in probe
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- [patch] crypto: omap-sham - potential Oops on error in probe
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 0/2] crypto: engine: permit to enqueue ashash_request
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 2/2] crypto: omap: convert to the new cryptoengine API
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH 1/2] crypto: engine: permit to enqueue ashash_request
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: Decrypting data in RX path
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: linux-4.6/drivers/crypto/ux500/hash/hash_core.c: 2 * possible bad size ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Typos and RSA
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Typos and RSA
- From: Gary R Hook <ghook@xxxxxxx>
- Re: Typos and RSA
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Typos and RSA
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Typos and RSA
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH] crypto: qat - fix typos sizeof for ctx
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto/sha1-mb: make sha1_x8_avx2() conform to C function ABI
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] crypto: caam - add support for LS1043A SoC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/sha1-mb: make sha1_x8_avx2() conform to C function ABI
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/sha1-mb: make sha1_x8_avx2() conform to C function ABI
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] crypto/sha1-mb: make sha1_x8_avx2() conform to C function ABI
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: algif - add akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto/sha1-mb: make sha1_x8_avx2() conform to C function ABI
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: SHA1-MB algorithm broken on latest kernel
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 6/8] crypto: caam - handle core endianness != caam endianness
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v2 0/8] crypto: caam - add support for LS1043A SoC
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: SHA1-MB algorithm broken on latest kernel
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: Decrypting data in RX path
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Re: [PATCH RESEND v5 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Costs of asym self tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Decrypting data in RX path
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Decrypting data in RX path
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: Decrypting data in RX path
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Decrypting data in RX path
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Crypto Update for 4.7
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: user - no parsing of CRYPTO_MSG_GETALG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] crypto: algif - add akcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- HWCAP_CRYPTO define for ARMv8?
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- [PATCH v6 1/6] crypto: AF_ALG -- add sign/verify API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 2/6] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 5/6] crypto: algif_akcipher - add ops_nokey
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 4/6] crypto: algif_akcipher - enable compilation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 0/6] crypto: algif - add akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH RESEND v5 6/6] crypto: AF_ALG - add support for key_id
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: SHA1-MB algorithm broken on latest kernel
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: add backlogging support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: add backlogging support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [PATCH] crypto: Intel SHA - add MODULE_ALIAS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3] Bluetooth: convert smp and selftest to crypto kpp API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] crypto: qat: remove unused vairable.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: SHA1-MB algorithm broken on latest kernel
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: SHA1-MB algorithm broken on latest kernel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- SHA1-MB algorithm broken on latest kernel
- From: Megha Dey <megha.dey@xxxxxxxxxxxxxxx>
- RE: [PATCH v2] Bluetooth: convert smp and selftest to crypto kpp API
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH v2] Bluetooth: convert smp and selftest to crypto kpp API
- From: Johan Hedberg <johan.hedberg@xxxxxxxxx>
- Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- [PATCH v2] crypto: rsa - return raw integers for the ASN.1 parser
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 1/3] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 2/3] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v5 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [RFC PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver 3]
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [RFC PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver 3]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver 3]
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: RSA/MPI handling issues and keyctl access to public key keyrings
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat: remove unused vairable.
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat: remove unused vairable.
- From: Muhammad Falak R Wani <falakreyaz@xxxxxxxxx>
- Re: [RFC PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver 3]
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] crypto/ccp: remove rwlocks_types.h
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RESEND v5 0/6] crypto: algif - add akcipher
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 1/8] KEYS: Provide key type operations for asymmetric key ops [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 3/8] KEYS: Provide missing asymmetric key subops for new key type ops [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 2/8] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 4/8] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 5/8] KEYS: Provide software public key query function [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 6/8] KEYS: Allow the public_key struct to hold a private key [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 7/8] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 8/8] KEYS: Implement PKCS#8 RSA Private Key parser [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 0/8] KEYS: keyctl operations for asymmetric keys [ver 3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] lib: asn1_decoder - add MODULE_LICENSE("GPL")
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: RSA/MPI handling issues and keyctl access to public key keyrings
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] crypto: caam: add backlogging support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - return raw integer for the ASN.1 parser
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] crypto: rsa - return raw integer for the ASN.1 parser
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] crypto/ccp: remove rwlocks_types.h
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [patch V4 21/31] crypto: use parity functions in qat_hal
- From: zengzhaoxiu@xxxxxxx
- [patch V4 30/31] crypto: use parity_long is sahara.c
- From: zengzhaoxiu@xxxxxxx
- Re: [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [patch V4 00/31] bitops: add parity functions
- From: zengzhaoxiu@xxxxxxx
- Re: [PATCH] crypto: caam: add backlogging support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [PATCH v6 3/3] crypto: kpp - Add ECDH software support
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v6 2/3] crypto: kpp - Add DH software implementation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v6 1/3] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v6 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH v2 4/8] powerpc: add io{read,write}64 accessors
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] powerpc: add io{read,write}64 accessors
- From: Scott Wood <scott.wood@xxxxxxx>
- RE: [PATCH] crypto: caam: add backlogging support
- From: Alexandru Porosanu <alexandru.porosanu@xxxxxxx>
- RE: [PATCH v5 0/3] Key-agreement Protocol Primitives (KPP) API
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] crypto: caam: fix caam_jr_alloc() ret code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - comply with ABIs that specify vrsave as reserved.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam: add backlogging support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] asm-generic/io.h: add io{read,write}64 accessors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] asm-generic/io.h: add io{read,write}64 accessors
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: RSA/MPI handling issues and keyctl access to public key keyrings
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] Bluetooth: convert smp and selftest to crypto kpp API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v5 3/3] crypto: kpp - Add ECDH software support
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v5 2/3] crypto: kpp - Add DH software implementation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v5 1/3] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH v5 0/3] Key-agreement Protocol Primitives (KPP) API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: pkcs1pad_verify_complete: decoding missing?
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: caam: add backlogging support
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- pkcs1pad_verify_complete: decoding missing?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 8/8] arm64: dts: ls1043a: add crypto node
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH v2 4/8] powerpc: add io{read,write}64 accessors
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Crypto Fixes for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: linux/bitops.h
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: linux/bitops.h
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v5 6/6] crypto: AF_ALG - add support for key_id
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3 v4] crypto: kpp - Add ECDH software support
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: caam: fix caam_jr_alloc() ret code
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [PATCH] crypto: caam: add backlogging support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: [PATCH RESEND v5 1/6] crypto: AF_ALG -- add sign/verify API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RESEND PATCH v2 1/8] asm-generic/io.h: allow barriers in io{read,write}{16,32}be
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: UB in general ... and linux/bitops.h in particular
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- Re: better patch for linux/bitops.h
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH RESEND v5 1/6] crypto: AF_ALG -- add sign/verify API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 2/6] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 5/6] crypto: algif_akcipher - add ops_nokey
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 4/6] crypto: algif_akcipher - enable compilation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH RESEND v5 0/6] crypto: algif - add akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: UB in general ... and linux/bitops.h in particular
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] arm64: add io{read,write}64be accessors
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 2/8] asm-generic/io.h: add io{read,write}64 accessors
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: UB in general ... and linux/bitops.h in particular
- From: John Denker <jsd@xxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 6/8] crypto: caam - handle core endianness != caam endianness
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Bluetooth: convert smp module to crypto kpp API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH v2 8/8] arm64: dts: ls1043a: add crypto node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 7/8] crypto: caam - add ARCH_LAYERSCAPE to supported architectures
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 2/8] asm-generic/io.h: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 3/8] arm64: add io{read,write}64be accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 5/8] crypto: caam - fix offset field in hw sg entries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 4/8] powerpc: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2 0/8] crypto: caam - add support for LS1043A SoC
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH v2] Bluetooth: convert smp module to crypto kpp API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: vmx - comply with ABIs that specify vrsave as reserved.
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/7] asm-generic/io.h: add io{read,write}64 accessors
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- RE: [PATCH] crypto: rsa - return raw integer for the ASN.1 parser
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH 1/7] asm-generic/io.h: add io{read,write}64 accessors
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 2/5] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- RE: [PATCH 0/3 v3] Key-agreement Protocol Primitives (KPP) API
- From: "Benedetto, Salvatore" <salvatore.benedetto@xxxxxxxxx>
- [PATCH] Bluetooth: convert smp module to crypto kpp API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 3/3 v4] crypto: kpp - Add ECDH software support
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 2/3 v4] crypto: kpp - Add DH software implementation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 1/3 v4] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 0/3 v4] Key-agreement Protocol Primitives (KPP) API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] asm-generic/io.h: add io{read,write}64 accessors
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/3 v3] Key-agreement Protocol Primitives (KPP) API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: better patch for linux/bitops.h
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: linux/bitops.h
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 1/4] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: linux/bitops.h
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: linux/bitops.h
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: linux/bitops.h
- From: John Denker <jsd@xxxxxxxx>
- Re: linux/bitops.h
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] asm-generic/io.h: add io{read,write}64 accessors
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: linux/bitops.h
- From: John Denker <jsd@xxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: better patch for linux/bitops.h
- From: John Denker <jsd@xxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: John Denker <jsd@xxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 4/4] random: add backtracking protection to the CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 3/4] random: add interrupt callback to VMBus IRQ handler
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 2/4] random: make /dev/urandom scalable for silly userspace programs
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 1/4] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH -v2 0/4] random: replace urandom pool with a CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- [PATCH 1/7] asm-generic/io.h: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 7/7] arm64: dts: ls1043a: add crypto node
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- [PATCH 0/7] crypto: caam - add support for LS1043A SoC
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 6/7] crypto: caam - add ARCH_LAYERSCAPE to supported architectures
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 5/7] crypto: caam - handle core endianness != caam endianness
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 4/7] crypto: caam - fix offset field in hw sg entries
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 3/7] powerpc: add io{read,write}64 accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/7] arm64: add io{read,write}64be accessors
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: hash - Fix page length clamping in hash walk
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Fix kernel unaligned access in mpi_write_to_sgl
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v2] crypto: hash - Fix page length clamping in hash walk
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2] crypto: hash - Fix page length clamping in hash walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: hash - Fix page length clamping in hash walk
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH] crypto: algif_skcipher: replace sg++ with sg_next()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Fix kernel unaligned access in mpi_write_to_sgl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] crypto: algif_skcipher: replace sg++ with sg_next()
- From: Muhammad Falak R Wani <falakreyaz@xxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: [crypto / sparc64] cryptomgr_test OOPS
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- [crypto / sparc64] cryptomgr_test OOPS
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 3/3] crypto: kpp - Add ECDH software support
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 2/3] crypto: kpp - Add DH software implementation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 1/3] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 0/3 v3] Key-agreement Protocol Primitives (KPP) API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [cryptodev:master 56/77] ccp-dmaengine.c:undefined reference to `dma_async_tx_descriptor_init'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Fix kernel unaligned access in mpi_write_to_sgl
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- crypto: hash - Fix page length clamping in hash walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v3] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- [PATCH v3] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- RE: [PATCH] crypto: talitos: fix driver init
- From: Alexandru Ardelean <Alexandru.Ardelean@xxxxxxxxxxxx>
- Re: [PATCH 4/5] crypto: Use dma_pool_zalloc
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: constify ccp_actions structure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-aes: Use dma_request_chan() for requesting DMA channel
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: qat - Fix typo in comments
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix adf_ctl_drv.c:undefined reference to adf_init_pf_wq
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Integrate with the crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: vmx - comply with ABIs that specify vrsave as reserved.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] lib/mpi: Fix kernel unaligned access in mpi_write_to_sgl
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - return raw integer for the ASN.1 parser
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Regarding mechanism to store/retrive the private data structure in any SHA/AEAD/ablkcipher algos
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Use dma_pool_zalloc
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- [crypto:master 8/8] ERROR: "adf_init_pf_wq" [drivers/crypto/qat/qat_common/intel_qat.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: skcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: skcipher
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Re: skcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: skcipher
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Re: [PATCH] crypto: constify ccp_actions structure
- From: Gary R Hook <ghook@xxxxxxx>
- Re: [PATCH 2/3] random: make /dev/urandom scalable for silly userspace programs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/3] random: make /dev/urandom scalable for silly userspace programs
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 3/3] random: add interrupt callback to VMBus IRQ handler
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 2/3] random: make /dev/urandom scalable for silly userspace programs
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 3/3] random: add interrupt callback to VMBus IRQ handler
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 3/3] random: add interrupt callback to VMBus IRQ handler
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 2/3] random: make /dev/urandom scalable for silly userspace programs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/3] random: make /dev/urandom scalable for silly userspace programs
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 1/3] random: replace non-blocking pool with a Chacha20-based CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH 3/3] random: add interrupt callback to VMBus IRQ handler
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [RFC PATCH 0/3] random: replace urandom pool with a CRNG
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: skcipher
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- skcipher
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- Patch "crypto: gcm - Fix rfc4543 decryption crash" has been added to the 3.14-stable tree
- From: <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto hash function decryption
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: Crypto hash function decryption
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Crypto hash function decryption
- From: Gadre Nayan <gadrenayan@xxxxxxxxx>
- [PATCH] crypto: constify ccp_actions structure
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- v4.6-rc1 regression bisected, Problem loading in-kernel X.509 certificate (-2)
- From: Jamie Heilman <jamie@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos: fix driver init
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 4/5] crypto: Use dma_pool_zalloc
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] Use dma_pool_zalloc
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- [PATCH 4/5] crypto: Use dma_pool_zalloc
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH 2/2] crypto: qat - make adf_vf_isr.c dependant on IOV config
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/2] crypto: qat - Fix typo in comments
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - fix adf_ctl_drv.c:undefined reference to adf_init_pf_wq
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] lib: asn1_decoder - add MODULE_LICENSE("GPL")
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] crypto: vmx - comply with ABIs that specify vrsave as reserved.
- From: Paulo Flabiano Smorigo <pfsmorigo@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v4 2/3] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v4 1/3] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v4 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] crypto: omap-sham: Use dma_request_chan() for requesting DMA channel
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- [PATCH] crypto: omap-des: Use dma_request_chan() for requesting DMA channel
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- [PATCH] crypto: omap-aes: Use dma_request_chan() for requesting DMA channel
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxx>
- [PATCH] crypto: rsa - return raw integer for the ASN.1 parser
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v2] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- [PATCH v2] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [PATCH] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: Stephan Mueller <sm@xxxxxxxx>
- [PATCH] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- [PATCH] crypto: Add a flag allowing the self-tests to be disabled at runtime.
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH v3 1/5] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 5/5] random: add interrupt callback to VMBus IRQ handler
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/5] crypto: Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/5] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 2/5] random: conditionally compile code depending on LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/5] crypto: LRNG - enable compile
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- [PATCH] crypto: talitos: fix driver init
- From: Alexandru Ardelean <ardeleanalex@xxxxxxxxx>
- Re: [RFC PATCH] crypto: Make the page handling of hash walk compatible to networking.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: omap-des: Integrate with the crypto engine framework
- From: Baolin <baolin.wang@xxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss: fix incorrect usage of scatterlists api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix invalid pf2vf_resp_wq logic
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] lib/mpi: Fix kernel unaligned access in mpi_write_to_sgl
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: random(4) changes
- From: Pavel Machek <pavel@xxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Pavel Machek <pavel@xxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: random(4) changes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss: fix incorrect usage of scatterlists api
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss: fix incorrect usage of scatterlists api
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH] crypto: s5p-sss: fix incorrect usage of scatterlists api
- From: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
- Re: random(4) changes
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: random(4) changes
- From: "George Spelvin" <linux@xxxxxxxxxxx>
- Re: [PATCH 1/2 v2] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: random(4) changes
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: random(4) changes
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Andi Kleen <andi@xxxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix invalid pf2vf_resp_wq logic
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: AEAD in TALITOS SEC1 versus TALITOS SEC2
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Use common BIT macro
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch 1/2] crypto: mxc-scc - signedness bugs in mxc_scc_ablkcipher_req_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: talitos - fix ahash algorithms registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Ensure all dependencies are specified
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] crypto: Make the page handling of hash walk compatible to networking.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Fix missed interrupts when working with 8 kB blocks
- From: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto: Linux Random Number Generator
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 3/6] crypto: Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 3/6] crypto: Linux Random Number Generator
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 2/6] random: conditionally compile code depending on LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 4/6] crypto: LRNG - enable compile
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 6/6] hyperv IRQ handler: trigger LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 3/6] crypto: Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v2 5/6] crypto: LRNG - hook LRNG into interrupt handler
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: random(4) changes
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: random(4) changes
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- random(4) changes
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: AEAD in TALITOS SEC1 versus TALITOS SEC2
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: AEAD in TALITOS SEC1 versus TALITOS SEC2
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Fix missed interrupts when working with 8 kB blocks
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Use common BIT macro
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [patch 2/2] crypto: mxc-scc - fix unwinding in mxc_scc_crypto_register()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch 1/2] crypto: mxc-scc - signedness bugs in mxc_scc_ablkcipher_req_init()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH] crypto: talitos - fix ahash algorithms registration
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Remove useless hash interrupt handler
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AEAD in TALITOS SEC1 versus TALITOS SEC2
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC][PATCH 0/6] /dev/random - a new approach
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos - fix conversion to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC][PATCH 0/6] /dev/random - a new approach
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/6] crypto: Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/6] random: conditionally compile code depending on LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 6/6] hyperv IRQ handler: trigger LRNG
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/6] crypto: LRNG - enable compile
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 5/6] crypto: LRNG - hook LRNG into interrupt handler
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC PATCH] crypto: Make the page handling of hash walk compatible to networking.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [cryptodev:master 56/59] warning: (RAPIDIO_DMA_ENGINE && ..) selects DMA_ENGINE which has unmet direct dependencies (DMADEVICES)
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH] crypto: ccp - Ensure all dependencies are specified
- From: Gary R Hook <gary.hook@xxxxxxx>
- [cryptodev:master 56/59] ccp-dmaengine.c:undefined reference to `dma_run_dependencies'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 56/59] undefined reference to `dma_request_slave_channel'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- AEAD in TALITOS SEC1 versus TALITOS SEC2
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 0/2] crypto: talitos - fix conversion to new AEAD interface
- From: "Jonas Eymann" <J.Eymann@xxxxxxx>
- Re: [PATCH 0/2] crypto: talitos - fix conversion to new AEAD interface
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- [cryptodev:master 56/59] warning: (RAPIDIO_DMA_ENGINE && ..) selects DMA_ENGINE which has unmet direct dependencies (DMADEVICES)
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Remove useless hash interrupt handler
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix use after free of copied input buffer in error path
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa: Improving code readability
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix use after free of copied input buffer in error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp - Register the CCP as a DMA resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: talitos - fix conversion to new AEAD interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crash in ppc4xx-rng on canyonland
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] scatterlist: Introduce some helper functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: console noise after commit c1e9b3b0eea
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- console noise after commit c1e9b3b0eea
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- [PATCH 1/2] crypto: talitos - fix crash in talitos_cra_init()
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: talitos - fix AEAD tcrypt tests
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: talitos - fix conversion to new AEAD interface
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH] crypto: marvell/cesa: Improving code readability
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa: Improving code readability
- From: Romain Perier <romain.perier@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Remove useless hash interrupt handler
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Fix use after free of copied input buffer in error path
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: AF_ALG - add support for key_id
- From: Philip Li <philip.li@xxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Milan Broz <mbroz@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v3] crypto: ccp - Register the CCP as a DMA resource
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: ppc/talitos oops on call to crypto_alloc_aead
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- RE: [PATCH v3 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: crash in ppc4xx-rng on canyonland
- From: Christian Lamparter <chunkeey@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix section mismatch warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: qat - move vf2pf_init and vf2pf_exit to common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crash in ppc4xx-rng on canyonland
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: ppc/talitos oops on call to crypto_alloc_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- [PATCH] kernel/padata: hide unused functions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [RFC PATCH] KEYS: Provide keyctls to do public key operations [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Provide keyctls to do public key operations
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: INFO: inconsistent lock state in ecryptfs_calculate_md5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Provide keyctls to do public key operations
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Provide keyctls to do public key operations
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 6/6] crypto: AF_ALG - add support for key_id
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [cryptodev:master 43/49] WARNING: drivers/crypto/qat/qat_common/intel_qat.o(.init.text+0x30d): Section mismatch in reference from the function init_module() to the function .exit.text:adf_exit_vf_wq()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 1/6] crypto: AF_ALG -- add sign/verify API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/6] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/6] crypto: AF_ALG -- add asymmetric cipher interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 4/6] crypto: algif_akcipher - enable compilation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 6/6] crypto: AF_ALG - add support for key_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 5/6] crypto: algif_akcipher - add ops_nokey
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/6] crypto: algif - add akcipher
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 43/49] WARNING: drivers/crypto/qat/qat_common/intel_qat.o(.init.text+0x30d): Section mismatch in reference from the function init_module() to the function .exit.text:adf_exit_vf_wq()
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [RFC PATCH] KEYS: Provide keyctls to do public key operations
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - fix section mismatch warning
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: qat - move vf2pf_init and vf2pf_exit to common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/3] crypto: qat - interrupts need to be enabled when VFs are disabled
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/3] crypto: qat - check if PF is running
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 43/49] WARNING: drivers/crypto/qat/built-in.o(.init.text+0x309): Section mismatch in reference from the function adf_register_ctl_device_driver() to the function .exit.text:adf_exit_vf_wq()
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- RE: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: document correct return value for request allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH resend] crypto: get rid of superfluous __GFP_REPEAT
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] Add Hisilicon Random Number Generator(RNG) support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Prevent information leakage on export
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: sha1-mb - use corrcet pointer while completing jobs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa - fix dst len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - adf_dev_stop should not be called in atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v2] crypto: ccp - Register the CCP as a DMA resource
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto,ccp: Fix RT breaking #include <linux/rwlock_types.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ppc/talitos oops on call to crypto_alloc_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: rsa - generalize ASN.1 sequences
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2 v2] crypto: kpp - Add DH software implementation
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 1/2 v2] crypto: Key-agreement Protocol Primitives API (KPP)
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- [PATCH 0/2 v2] Key-agreement Protocol Primitives (KPP) API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH v3 2/3] crypto: rsa_helper - add raw integer parser actions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] KEYS: Provide keyctls to do public key operations
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 1/2] dt/bindings: Add bindings for hisilicon random number generator
- From: Rob Herring <robh@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]