Linux Crypto
[Prev Page][Next Page]
- [PATCH v2 1/2] crypto: qat - avoid memory corruption or undefined behaviour
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 2/3] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 1/3] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 0/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 4/4] crypto: rsa_helper - export symbols for asn1 structures
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 3/4] crypto: add CONFIG_ symbol for rsa helper
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 2/4] crypto: rsa_helper - add raw integer parser actions
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 1/4] crypto: rsa - generalize ASN.1 sequences
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH v2 0/4] crypto: rsa - generalize ASN.1 sequences
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH] PKCS#7: pkcs7_validate_trust(): initialize the _trusted output argument
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Crypto Fixes for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] PKCS#7: pkcs7_validate_trust(): initialize the _trusted output argument
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] crypto: add driver-side scomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Remove redundant nrbg rings
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - make sure const_tab is 1024 bytes aligned
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: sun4i-ss: use spin_lock_irq{save|restore}
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: sun4i-ss: use spin_lock_irq{save|restore}
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH RESEND v2 00/14] lib/mpi: bug fixes and cleanup
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 14/14] lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 13/14] lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 12/14] lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 08/14] lib/mpi: mpi_read_buffer(): fix buffer overflow
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 09/14] lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 10/14] lib/mpi: mpi_read_raw_from_sgl(): don't include leading zero SGEs in nbytes
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 05/14] lib/mpi: mpi_write_sgl(): replace open coded endian conversion
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 11/14] lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 07/14] lib/mpi: mpi_read_buffer(): replace open coded endian conversion
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 06/14] lib/mpi: mpi_read_buffer(): optimize skipping of leading zero limbs
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 01/14] lib/mpi: mpi_write_sgl(): fix skipping of leading zero limbs
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 03/14] lib/mpi: mpi_write_sgl(): purge redundant pointer arithmetic
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 02/14] lib/mpi: mpi_write_sgl(): fix style issue with lzero decrement
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 04/14] lib/mpi: mpi_write_sgl(): fix out-of-bounds stack access
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH v3 00/14] lib/mpi: bug fixes and cleanup
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH RESEND v2 00/14] lib/mpi: bug fixes and cleanup
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH RESEND v2 00/14] lib/mpi: bug fixes and cleanup
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] x86: Avoid undefined behavior in macro expansion
- From: Vinicius Tinti <viniciustinti@xxxxxxxxx>
- [PATCH v3 3/3] crypto: s5p-sss - Sort the headers to improve readability
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v3 2/3] crypto: s5p-sss - Handle unaligned buffers
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v3 1/3] crypto: s5p-sss - Minor coding cleanups
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 02/10] crypto: rsa_helper - add raw integer parser actions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Add a new maintainer for the CCP driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 01/10] crypto: rsa - generalize ASN.1 sequences
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- RE: [PATCH 02/10] crypto: rsa_helper - add raw integer parser actions
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH RESEND v2 01/14] lib/mpi: mpi_write_sgl(): fix skipping of leading zero limbs
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 02/14] lib/mpi: mpi_write_sgl(): fix style issue with lzero decrement
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 04/14] lib/mpi: mpi_write_sgl(): fix out-of-bounds stack access
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 03/14] lib/mpi: mpi_write_sgl(): purge redundant pointer arithmetic
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 07/14] lib/mpi: mpi_read_buffer(): replace open coded endian conversion
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 05/14] lib/mpi: mpi_write_sgl(): replace open coded endian conversion
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 10/14] lib/mpi: mpi_read_raw_from_sgl(): don't include leading zero SGEs in nbytes
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 13/14] lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 11/14] lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 14/14] lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 12/14] lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 09/14] lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 08/14] lib/mpi: mpi_read_buffer(): fix buffer overflow
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 06/14] lib/mpi: mpi_read_buffer(): optimize skipping of leading zero limbs
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- [PATCH RESEND v2 00/14] lib/mpi: bug fixes and cleanup
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- RE: [PATCH 10/10] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- RE: [PATCH 07/10] crypto: qat - remove duplicate ASN.1 parser
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- RE: [PATCH 01/10] crypto: rsa - generalize ASN.1 sequences
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [patch] crypto: marvell/cesa - remove unneeded condition
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [patch] crypto: marvell/cesa - remove unneeded condition
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] PKCS#7: pkcs7_validate_trust(): initialize the _trusted output argument
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH 07/10] crypto: qat - remove duplicate ASN.1 parser
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 01/10] crypto: rsa - generalize ASN.1 sequences
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 10/10] crypto: caam - add support for RSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: cleaning and refactoring in rsa.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: Avoid undefined behavior in macro expansion
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: cleaning and refactoring in rsa.c
- From: maitesin <oscar.forner.martinez@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 08/10] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 02/10] crypto: rsa_helper - add raw integer parser actions
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 01/10] crypto: rsa - generalize ASN.1 sequences
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 03/10] crypto: add CONFIG_ symbol for rsa helper
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 05/10] crypto: qat - avoid memory corruption or undefined behaviour
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 06/10] crypto: qat - fix address leaking of RSA public exponent
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 10/10] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 07/10] crypto: qat - remove duplicate ASN.1 parser
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 09/10] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 08/10] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 04/10] crypto: rsa_helper - export symbols for asn1 structures
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 02/10] crypto: rsa_helper - add raw integer parser actions
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] PKCS#7: fix missing break on OID_sha224 case
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH] crypto: gcm - Fix rfc4543 decryption crash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Sinan Kaya <okaya@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] crypto: add driver-side scomp interface
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Sinan Kaya <okaya@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Sinan Kaya <okaya@xxxxxxxxxxxxxx>
- [PATCH] crypto: n2 - Remove return statement from void function
- From: Amitoj Kaur Chawla <amitoj1606@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: okaya@xxxxxxxxxxxxxx
- Re: [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [PATCH 1/3] crypto: marvell/cesa - replace dma_to_phys with dma_map_single
- From: Sinan Kaya <okaya@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - forward devm_ioremap_resource() error code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - fix lock acquisition code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] crypto: add driver-side scomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa - forward devm_ioremap_resource() error code
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - forward devm_ioremap_resource() error code
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: marvell/cesa - forward devm_ioremap_resource() error code
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: marvell/cesa - fix memory leak
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: marvell/cesa - fix memory leak
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: marvell/cesa - initialize hash states
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH] x86: Avoid undefined behavior in macro expansion
- From: Vinicius Tinti <viniciustinti@xxxxxxxxx>
- [PATCH] crypto: ccp - fix lock acquisition code
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: eCryptfs: Use skcipher and shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH v2 3/4] crypto: Introduce the bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH v2 4/4] md: dm-crypt: Initialize the sector number for one request
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH v2 2/4] crypto: Introduce some helper functions to help to merge requests
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH v2 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH v2 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Crypto Update for 4.6
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: s5p-sss - Sort the headers to improve readability
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH] crypto: s5p-sss - Enable COMPILE_TEST
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Mark McKinstry <Mark.McKinstry@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Use different flag vars for nested locks
- From: Gary R Hook <ghook@xxxxxxx>
- [PATCH] crypto: s5p-sss - Enable COMPILE_TEST
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH] hwrng: exynos - Enable COMPILE_TEST
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 4/4] hwrng: exynos - Disable runtime PM on driver unbind
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 3/4] hwrng: exynos - Disable runtime PM on probe failure
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 2/4] hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 1/4] hwrng: exynos - Runtime suspend device after init
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH] crypto: Improve wording for CRYPTO_DEV_OMAP_DES in Kconfig
- From: Peter Meerwald <pmeerw@xxxxxxxxxx>
- [BUG] crypto: sun4i-ss: Random data corruption
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 5/5] hwrng: exynos - Disable runtime PM on driver unbind
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 1/5] hwrng: exynos - Hide PM functions with __maybe_unused
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Use different flag vars for nested locks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - Use different flag vars for nested locks
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ccp - Use different flag vars for nested locks
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH v2 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Vladimir Zapolskiy <vladimir_zapolskiy@xxxxxxxxxx>
- [cryptodev:master 112/119] drivers/crypto/ccp/ccp-dev.c:120:2-20: ERROR: nested lock+irqsave that reuses flags from line 118.
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH v2 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] ARM: i.MX25: add RNGC node to dtsi
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove redundant arbiter configuration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ux500: fix checks of error code returned by devm_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel: fix checks of error code returned by devm_ioremap_resource()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/14] hw_random: exynos: use __maybe_unused to hide pm functions
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Change the definition of icp_qat_uof_regtype
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: ccp - CCP driver updates 2016-03-01
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [patch] crypto: rsa-pkcs1pad: indent a couple statements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] crypto: add basic driver for the MXC SCC
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] hwrng: exynos - Runtime suspend device after init
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 5/5] hwrng: exynos - Disable runtime PM on driver unbind
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 4/5] hwrng: exynos - Disable runtime PM on probe failure
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 3/5] hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH 1/5] hwrng: exynos - Hide PM functions with __maybe_unused
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: af_alg - add async support to algif_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Robert Jarzmik <robert.jarzmik@xxxxxxx>
- Re: crypto regression in 4.1.18: Check that kernel supports aes-cbc-essiv:sha256 cipher
- From: Eric Wheeler <linux-crypto@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] crypto: s5p-sss - Handle unaligned buffers
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 3/3] crypto: s5p-sss - Sort the headers to improve readability
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- [PATCH v2 1/3] crypto: s5p-sss - Minor coding cleanups
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- linux-crypto Your Electricity Bill 824703662393
- From: "jakki stendeback" <jakkij0d0st@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Minor coding cleanups
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxx>
- [PATCH] crypto: qat - remove redundant arbiter configuration
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [patch] crypto: rsa-pkcs1pad: indent a couple statements
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] security: integrity: Remove select to deleted option PUBLIC_KEY_ALGO_RSA
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: add basic driver for the MXC SCC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] ARM: i.MX25: add scc module to dtsi
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Cristian Stoica <cristian.stoica@xxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Minor coding cleanups
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: crypto regression in 4.1.18: Check that kernel supports aes-cbc-essiv:sha256 cipher
- From: Eric Wheeler <linux-crypto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Handle unaligned buffers
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Handle unaligned buffers
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Minor coding cleanups
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Handle unaligned buffers
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Minor coding cleanups
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH 3/3] crypto: algif_aead - modify algif aead interface to work with encauth
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/3] crypto: af_alg - add AEAD operation type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: authenc - add TLS type encryption
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: af_alg - add TLS type encryption
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ux500: fix checks of error code returned by devm_ioremap_resource()
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH] crypto: atmel: fix checks of error code returned by devm_ioremap_resource()
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- [PATCH] security: integrity: Remove select to deleted option PUBLIC_KEY_ALGO_RSA
- From: Andreas Ziegler <andreas.ziegler@xxxxxx>
- Left-over select to PUBLIC_KEY_ALGO_RSA
- From: Andreas Ziegler <andreas.ziegler@xxxxxx>
- Re: Left-over select to PUBLIC_KEY_ALGO_RSA
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto/async_pq: use __free_page() instead of put_page()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: Miscellaneous bits for security/next
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] KEYS: Miscellaneous bits for security/next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Robert Jarzmik <robert.jarzmik@xxxxxxx>
- Re: [PATCH V2] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto/async_pq: use __free_page() instead of put_page()
- From: Vinod Koul <vinod.koul@xxxxxxxxx>
- Re: [PATCH 4/4] crypto: ccp - Add abstraction for device-specific calls
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/4] crypto: ccp - CCP versioning support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/4] crypto: ccp - Support for multiple CCPs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/4] crypto: ccp - Remove check for x86 family and model
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH V2] crypto: implement DH primitives under akcipher API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 0/3] KEYS: Use crypto rsa pkcs1pad module for software public keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Change the definition of icp_qat_uof_regtype
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH 0/4] Introduce bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 2/4] crypto: Introduce some helper functions to help to merge requests
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 3/4] crypto: Introduce the bulk mode for crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 4/4] md: dm-crypt: Initialize the sector number for one request
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 1/4] scatterlist: Introduce some helper functions
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 07/14] hw_random: exynos: use __maybe_unused to hide pm functions
- From: Krzysztof Kozlowski <k.kozlowski@xxxxxxxxxxx>
- Re: crypto regression in 4.1.18: Check that kernel supports aes-cbc-essiv:sha256 cipher
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 07/14] hw_random: exynos: use __maybe_unused to hide pm functions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 00/14] drivers: use __maybe_unused to hide pm functions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 1/7] A couple of generated files
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- [PATCH 3/4] crypto: ccp - CCP versioning support
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 4/4] crypto: ccp - Add abstraction for device-specific calls
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 1/4] crypto: ccp - Remove check for x86 family and model
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 2/4] crypto: ccp - Support for multiple CCPs
- From: Gary R Hook <gary.hook@xxxxxxx>
- [PATCH 0/4] crypto: ccp - CCP driver updates 2016-03-01
- From: Gary R Hook <gary.hook@xxxxxxx>
- Re: [PATCH] crypto/async_pq: use __free_page() instead of put_page()
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH 2/3] ARM: i.MX25: add RNGC node to dtsi
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- RE: [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: crypto regression in 4.1.18: Check that kernel supports aes-cbc-essiv:sha256 cipher
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- crypto regression in 4.1.18: Check that kernel supports aes-cbc-essiv:sha256 cipher
- From: Eric Wheeler <linux-crypto@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto/async_pq: use __free_page() instead of put_page()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 3/3] hwrng: mxc-fsl - add support for Freescale RNGC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH 2/3] ARM: i.MX25: add RNGC node to dtsi
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH 1/3] Documentation: devicetree: add Freescale RNGC binding
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- Re: [PATCH] PKCS#7: fix unitialized boolean 'want'
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2 3/3] crypto: add basic driver for the MXC SCC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] ARM: i.MX25: add scc module to dtsi
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH] crypto/async_pq: use __free_page() instead of put_page()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] [RFC] mm/page_ref, crypto/async_pq: don't put_page from __exit
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/3] KEYS: Use crypto rsa pkcs1pad module for software public keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] [RFC] mm/page_ref, crypto/async_pq: don't put_page from __exit
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH] [RFC] mm/page_ref, crypto/async_pq: don't put_page from __exit
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/4] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: remove padding logic from rsa.c
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/4] crypto: algif_skcipher - Require setkey before accept(2)
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 1/2] lib/mpi: avoid assembler warning
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - memset request context to zero during import
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: brcm63xx-rng: fix non device tree compatibility
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] The AE id should be less than the maximal AE number
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: allow rfc3686 aes-ctr variants in fips mode.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MPI: Endianness fix
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v6] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] KEYS: Use crypto rsa pkcs1pad module for software public keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: remove padding logic from rsa.c
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: algif_hash - correctly handle algos without state
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] PKCS#7: fix unitialized boolean 'want'
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: Is a crypto_ahash_init required before invoking crypto_ahash_import?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [PATCH 3/3] X.509: Make algo identifiers text instead of enum
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/3] akcipher: Move the RSA DER encoding check to the crypto layer
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/3] crypto: Add hash param to pkcs1pad
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/3] KEYS: Use crypto rsa pkcs1pad module for software public keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/3] crypto: Add hash param to pkcs1pad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: remove padding logic from rsa.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: remove padding logic from rsa.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] X.509: Fix test for self-signed certificate
- From: Michal Marek <mmarek@xxxxxxxx>
- [PATCH 2/2] lib/mpi: use "static inline" instead of "extern inline"
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] lib/mpi: avoid assembler warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 4/4] crypto: algif_skcipher - Fix race condition in skcipher_check_key
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/4] crypto: algif_skcipher - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 3/4] crypto: algif_skcipher - Remove custom release parent function
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 1/4] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH] crypto: ccp - memset request context to zero during import
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Is a crypto_ahash_init required before invoking crypto_ahash_import?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Is a crypto_ahash_init required before invoking crypto_ahash_import?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Is a crypto_ahash_init required before invoking crypto_ahash_import?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Mark McKinstry <Mark.McKinstry@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/8] crypto: add driver-side scomp interface
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 8/8] crypto: acomp - update testmgr with support for acomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 0/8] crypto: asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 7/8] crypto: acomp - add support for deflate via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 1/8] crypto: add asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 6/8] crypto: acomp - add support for 842 via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 4/8] crypto: acomp - add support for lz4 via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 5/8] crypto: acomp - add support for lz4hc via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v3 3/8] crypto: acomp - add support for lzo via scomp
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH v2 0/2] crypto: asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 0/2] KEYS: Use pkcs1pad for padding in software_pkey
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/2] crypto: Add hash param to pkcs1pad
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] KEYS: Use pkcs1pad for padding in software_pkey
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] crypto: remove padding logic from rsa.c
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] X.509: Fix test for self-signed certificate
- From: David Howells <dhowells@xxxxxxxxxx>
- Asymmetric ciphers: counter measures
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH] crypto: algif_hash - correctly handle algos without state
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: Andrew Zaborowski <balrogg@xxxxxxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: 3.14.61 breaks dm disk drive encryption?
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- 3.14.61 breaks dm disk drive encryption?
- From: "J. Paul Reed" <preed@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: Andrew Zaborowski <balrogg@xxxxxxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/8] X.509: Software public key subtype changes
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- RE: [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/3] crypto: scatterwalk - export scatterwalk_pagedone
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 3/3] crypto: caam - add support for RSA algorithm
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH 1/3] crypto: scatterwak - Add scatterwalk_sg_copychunks
- From: Tudor Ambarus <tudor-dan.ambarus@xxxxxxx>
- [PATCH] hw_random: brcm63xx-rng: fix non device tree compatibility
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH] Re: Broken userspace crypto in linux-4.1.18
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: [PATCH v2 1/2] dt/bindings: Add bindings for the PIC32 random number generator
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: allow rfc3686 aes-ctr variants in fips mode.
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: allow rfc3686 aes-ctr variants in fips mode.
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [cryptodev:master 95/102] arch/arm64/crypto/aes-glue.c:88:2: error: implicit declaration of function 'xts_check_key'
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [cryptodev:master 95/102] arch/arm64/crypto/aes-glue.c:88:2: error: implicit declaration of function 'xts_check_key'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] The AE id should be less than the maximal AE number
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Mark McKinstry <Mark.McKinstry@xxxxxxxxxxxxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Willy Tarreau <w@xxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Willy Tarreau <w@xxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- Re: Broken userspace crypto in linux-4.1.18
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Broken userspace crypto in linux-4.1.18
- From: "Thomas D." <whissi@xxxxxxxxx>
- [PATCH] MPI: Endianness fix
- From: Michal Marek <mmarek@xxxxxxxx>
- Re: [PATCH] crypto: fix compile errors of XTS
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix leak on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- [PATCH] crypto: fix compile errors of XTS
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] X.509: Fix test for self-signed certificate
- From: lee joey <joeyli.kernel@xxxxxxxxx>
- [cryptodev:master 95/101] arch/s390/crypto/aes_s390.c:592:2: error: implicit declaration of function 'xts_check_key'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 95/101] arch/arm/crypto/aesbs-glue.c:94:2: error: implicit declaration of function 'xts_check_key'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix leak on error path
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: atmel-sha - fix .import()/.export() implementation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] dt/bindings: Add bindings for the PIC32 random number generator
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: xts - consolidate sanity check for keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix leak on error path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - Staticize caam_jr_shutdown()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Documentation: crypto API documentation updates
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] crypto: asynchronous compression api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] Documentation: crypto - add akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/4] Documentation: crypto API documentation updates
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/4] Documentation: crypto - add skcipher API documentation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] Documentation: crypto - add crypto_rng_generate
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/4] Documentation: crypto - update AEAD AD handling
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [RFC PATCH v6] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <wzz@xxxxxxxxxxxxxx>
- Re: [PATCH] arm/arm64/crypto: assure that ECB modes don't require an IV
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH] crypto: implement DH primitives under akcipher API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: implement DH primitives under akcipher API
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Patch "crypto: fix test vector for rsa" has been added to the 4.3-stable tree
- From: <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - Staticize caam_jr_shutdown()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Shawn Guo <shawnguo@xxxxxxxxxx>
- Re: [PATCH] crypto: prevent 112bit key for 3DES
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] crypto: prevent 112bit key for 3DES
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] arm/arm64/crypto: assure that ECB modes don't require an IV
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: prevent 112bit key for 3DES
- From: Roman Drahtmueller <draht@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] arm/arm64/crypto: assure that ECB modes don't require an IV
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 3/3] crypto: add basic driver for the MXC SCC
- From: Lothar Waßmann <LW@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] crypto: add basic driver for the MXC SCC
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH 1/3] Documentation: devicetree: add Freescale SCC bindings
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH 2/3] ARM: i.MX25: add scc module to dtsi
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH] X.509: Fix test for self-signed certificate
- From: Michal Marek <mmarek@xxxxxxxx>
- Re: [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - fix leak on error path
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] vti6: Add pmtu handling to vti6_xmit.
- From: Mark McKinstry <Mark.McKinstry@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Transferring applied X.509 patches from crypto/next to security/next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] crypto: asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 2/2] crypto: extended acomp api for supporting deflate algorithm parameters
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH v2 1/2] crypto: add asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: RSA decryption output length
- From: Tudor-Dan Ambarus <tudor-dan.ambarus@xxxxxxx>
- Re: Transferring applied X.509 patches from crypto/next to security/next
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] crypto: xts - consolidate sanity check for keys
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: fips: allow more ipsec related methods
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - Set ctx->e to NULL in qat_rsa_exit_tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - Set ctx->e to NULL in qat_rsa_exit_tfm
- From: Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: add asynchronous compression api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: fips: allow more ipsec related methods
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: Transferring applied X.509 patches from crypto/next to security/next
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Transferring applied X.509 patches from crypto/next to security/next
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: Transferring applied X.509 patches from crypto/next to security/next
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- [PATCH v2 1/2] dt/bindings: Add bindings for the PIC32 random number generator
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- [PATCH 0/2] crypto: asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 1/2] crypto: add asynchronous compression api
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 2/2] crypto: extended acomp api for supporting deflate algorithm parameters
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- [PATCH 0/2] crypto: atmel-sha - fix .import()/.export() implementation
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha - fix .import()/.export() implementation
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 2/2] crypto: atmel-sha - fix race in atmel_sha_final()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Transferring applied X.509 patches from crypto/next to security/next
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - consolidate sanity check for keys
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: xts - consolidate sanity check for keys
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] crypto: xts - consolidate sanity check for keys
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] crypto: cesa: fix test in mv_cesa_dev_dma_init()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: atmel-sha - fix resource management
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: sahara - remove unneeded mutex in the exported state
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fix out of bound read in __test_aead()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Don't assume export/import areas are aligned
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: aead - move aead_request_cast helper to aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: user - lock crypto_alg_list on alg dump
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: RSA decryption output length
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: cesa: fix test in mv_cesa_dev_dma_init()
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH 2/2] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Marcus Meissner <meissner@xxxxxxx>
- [PATCH 2/2] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Marcus Meissner <meissner@xxxxxxx>
- [PATCH 2/2] crypto: atmel-sha - remove calls of clk_prepare() from atomic contexts
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha: fix atmel_sha_remove()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 0/2] crypto: atmel-sha - fix resource management
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH 5/6] staging: lustre: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] staging: lustre: Use ahash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [v4 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [v4 PATCH 3/3] crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 2/3] crypto: algif_skcipher - Do not dereference ctx without socket lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 0/3] crypto: algif_skcipher - fixes after skcipher conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: sahara - fill the statesize field
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v3 2/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v3 1/3] crypto: sahara - remove unneeded mutex in the exported state
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v2] fix out of bound read in __test_aead()
- From: "Jerome Marchand" <jmarchan@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/3] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/3] crypto: public_key: remove MPIs from public_key_signature struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v1] crypto: ccp - Don't assume export/import areas are aligned
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: [linux-sunxi] [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce the cypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [v3 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] fix out of bound read in __test_aead()
- From: Jerome Marchand <jmarchan@xxxxxxxxxx>
- Re: [patch] crypto: keywrap - memzero the correct memory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce the cypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fix out of bound read in __test_aead()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] staging: lustre: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: hash - Remove crypto_hash interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: hash - Add helpers to return alg and driver names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: skcipher - Fix driver name helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: doc - Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: tcrypt - Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: hash - Remove crypto_hash interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: user - lock crypto_alg_list on alg dump
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [v3 PATCH 3/3] crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 2/3] crypto: algif_skcipher - Do not dereference ctx without socket lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 0/3] crypto: algif_skcipher - fixes after skcipher conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: atmel-sha: fix algorihtm registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: algif_hash - wait for crypto_ahash_init() to complete
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: mcryptd - Fix load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [patch] crypto: keywrap - memzero the correct memory
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [patch] crypto: keywrap - memzero the correct memory
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Duplicated module names
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [v2 PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2] crypto: atmel-sha: fix algorihtm registration
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: Duplicated module names
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- [RFC 2/2] crypto: tcrypt - Add ahash digest bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- tcrypt bandwidth tests
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [PATCH] fix out of bound read in __test_aead()
- From: "Jerome Marchand" <jmarchan@xxxxxxxxxx>
- Re: Duplicated module names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Duplicated module names
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Duplicated module names
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: modinfo crc32 broken after fd44a98ae2eb
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: skcipher - return the correct request to the user
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/2] crypto: afalg_skcipher - fixes after skcipher conversion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [kbuild-all] [PATCH] crypto: af_alg - add async support to algif_aead
- From: Fengguang Wu <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [cryptodev:master 54/61] net/sctp/sm_make_chunk.c:1688:1: warning: 'sctp_pack_cookie.isra.6' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: skcipher - return the correct request to the user
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/3] crypto: algif_skcipher - increase private contex space for async request
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/3] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: skcipher - return the correct request to the user
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: afalg_skcipher - fixes after skcipher conversion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 53/61] fs/nfsd/nfs4recover.c:147:1: warning: 'nfs4_make_rec_clidname' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 50/61] drivers/nfc/s3fwrn5/firmware.c:501:1: warning: 's3fwrn5_fw_download' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 49/61] drivers/block/drbd/drbd_worker.c:304:1: warning: 'drbd_csum_ee' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto/compress: remove unused pcomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: algif_hash - wait for crypto_ahash_init() to complete
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 2/4] crypto: mcryptd - Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 0/4] Fix sha1_mb failure and testing import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] eCryptfs: Clean up crypto initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH 17/26] mac802154: Use skcipher
- From: Stefan Schmidt <stefan@xxxxxxxxxxxxxxx>
- Re: AF_ALG: hash returns -ENOKEY
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG: hash returns -ENOKEY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - select CRYPTO_HASH where needed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [PATCH] crypto: skcipher - Add helper to retrieve driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GCM: cra_name == cra_driver_name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/3] crypto: Introduce crypto_queue_len() helper function
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 0/3] Introduce the cypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 3/3] crypto: omap-aes: Support crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 2/3] crypto: Introduce the block request crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Ilya Dryomov <idryomov@xxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM: cra_name == cra_driver_name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: add algorithm type specific flag, CRYPTO_ALG_PRIVATE
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 01/10] crypto/compress: remove unused pcomp interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 03/10] crypto/compress: introduce sychronuous compression API
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 05/10] crypto/lzo: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 08/10] crypto/842: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 10/10] crypto/testmgr: add new compression APIs test
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 09/10] crypto/deflate: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 07/10] crypto/lz4hc: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 06/10] crypto/lz4: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 00/10] Introduce new async/sync compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Richard Weinberger <richard@xxxxxx>
- GCM: cra_name == cra_driver_name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- AF_ALG: hash returns -ENOKEY
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [dm-devel] [PATCH 22/26] iscsi_tcp: Use ahash
- From: Mike Christie <michaelc@xxxxxxxxxxx>
- Re: [PATCH 1/2] n2rng: documentation, add DT bindings, vendor prefixes
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: hash - select CRYPTO_HASH where needed
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Ilya Dryomov <idryomov@xxxxxxxxx>
- [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 1/2] n2rng: documentation, add DT bindings, vendor prefixes
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- re: [PATCH] eCryptfs: Clean up crypto initialization
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH] crypto: drbg - remove FIPS 140-2 continuous test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]