Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH 2/2] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Marcus Meissner <meissner@xxxxxxx>
- [PATCH 2/2] crypto: testmgr: mark more algorithms as FIPS compliant
- From: Marcus Meissner <meissner@xxxxxxx>
- [PATCH 2/2] crypto: atmel-sha - remove calls of clk_prepare() from atomic contexts
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha: fix atmel_sha_remove()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 0/2] crypto: atmel-sha - fix resource management
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: mark authenticated ctr(aes) also as FIPS able
- From: Marcus Meissner <meissner@xxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH 5/6] staging: lustre: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] staging: lustre: Use ahash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [v4 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [v4 PATCH 3/3] crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 2/3] crypto: algif_skcipher - Do not dereference ctx without socket lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v4 PATCH 0/3] crypto: algif_skcipher - fixes after skcipher conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] crypto: sahara - fill the statesize field
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v3 2/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v3 1/3] crypto: sahara - remove unneeded mutex in the exported state
- From: Fabio Estevam <fabio.estevam@xxxxxxx>
- [PATCH v2] fix out of bound read in __test_aead()
- From: "Jerome Marchand" <jmarchan@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/3] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/3] crypto: public_key: remove MPIs from public_key_signature struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v1] crypto: ccp - Don't assume export/import areas are aligned
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- Re: [linux-sunxi] [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce the cypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] rng: pic32-rng: Add PIC32 RNG hardware driver
- From: Joshua Henderson <joshua.henderson@xxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [v3 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 02/11] crypto: sunxi-ss: prevent compilation on 64-bit
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] fix out of bound read in __test_aead()
- From: Jerome Marchand <jmarchan@xxxxxxxxxx>
- Re: [patch] crypto: keywrap - memzero the correct memory
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Introduce the cypto engine framework
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fix out of bound read in __test_aead()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] staging: lustre: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] crypto: hash - Remove crypto_hash interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] crypto: hash - Add helpers to return alg and driver names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] crypto: skcipher - Fix driver name helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] crypto: doc - Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] crypto: tcrypt - Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] crypto: hash - Remove crypto_hash interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: user - lock crypto_alg_list on alg dump
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [v3 PATCH 3/3] crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 2/3] crypto: algif_skcipher - Do not dereference ctx without socket lock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 1/3] crypto: algif_skcipher - Do not assume that req is unchanged
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v3 PATCH 0/3] crypto: algif_skcipher - fixes after skcipher conversion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: atmel-sha: fix algorihtm registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] crypto: algif_hash - wait for crypto_ahash_init() to complete
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] crypto: mcryptd - Fix load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [patch] crypto: keywrap - memzero the correct memory
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [patch] crypto: keywrap - memzero the correct memory
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: Duplicated module names
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- [PATCH v1] crypto: ccp - Limit the amount of information exported
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [v2 PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH] crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH v2] crypto: atmel-sha: fix algorihtm registration
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: Duplicated module names
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- [RFC 2/2] crypto: tcrypt - Add ahash digest bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [RFC 1/2] crypto: tcrypt - Add acipher bandwidth tests support
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- tcrypt bandwidth tests
- From: Catalin Vasile <cata.vasile@xxxxxxx>
- [PATCH] fix out of bound read in __test_aead()
- From: "Jerome Marchand" <jmarchan@xxxxxxxxxx>
- Re: Duplicated module names
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Duplicated module names
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Duplicated module names
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: modinfo crc32 broken after fd44a98ae2eb
- From: Lucas De Marchi <lucas.de.marchi@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] crypto: skcipher - return the correct request to the user
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/2] crypto: afalg_skcipher - fixes after skcipher conversion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [kbuild-all] [PATCH] crypto: af_alg - add async support to algif_aead
- From: Fengguang Wu <lkp@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [cryptodev:master 54/61] net/sctp/sm_make_chunk.c:1688:1: warning: 'sctp_pack_cookie.isra.6' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 2/3] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: skcipher - return the correct request to the user
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: aead - move aead_request_cast helper to aead.h
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- [PATCH 3/3] crypto: algif_skcipher - increase private contex space for async request
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/3] crypto: algif_skcipher - fix async callback after skcipher convertion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/3] crypto: skcipher - return the correct request to the user
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/3] crypto: afalg_skcipher - fixes after skcipher conversion
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 53/61] fs/nfsd/nfs4recover.c:147:1: warning: 'nfs4_make_rec_clidname' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 50/61] drivers/nfc/s3fwrn5/firmware.c:501:1: warning: 's3fwrn5_fw_download' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [cryptodev:master 49/61] drivers/block/drbd/drbd_worker.c:304:1: warning: 'drbd_csum_ee' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] crypto/compress: remove unused pcomp interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Linux-ima-user] [RFC] i.MX6 CAAM blob generator for IMA/EVM initialization
- From: Steffen Trumtrar <s.trumtrar@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] crypto: algif_hash - wait for crypto_ahash_init() to complete
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 2/4] crypto: mcryptd - Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 4/4] crypto: testmgr - Add a test case for import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 1/4] crypto x86/sha1_mb: Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v2 0/4] Fix sha1_mb failure and testing import()/export()
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] eCryptfs: Clean up crypto initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH 17/26] mac802154: Use skcipher
- From: Stefan Schmidt <stefan@xxxxxxxxxxxxxxx>
- Re: AF_ALG: hash returns -ENOKEY
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: AF_ALG: hash returns -ENOKEY
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hash - select CRYPTO_HASH where needed
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- [PATCH] crypto: skcipher - Add helper to retrieve driver name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 1/2] crypto: sunxi - don't print confusing data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GCM: cra_name == cra_driver_name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/3] crypto: Introduce crypto_queue_len() helper function
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 0/3] Introduce the cypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 3/3] crypto: omap-aes: Support crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- [PATCH 2/3] crypto: Introduce the block request crypto engine framework
- From: Baolin Wang <baolin.wang@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Ilya Dryomov <idryomov@xxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GCM: cra_name == cra_driver_name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH v2 02/10] crypto: add algorithm type specific flag, CRYPTO_ALG_PRIVATE
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 01/10] crypto/compress: remove unused pcomp interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 03/10] crypto/compress: introduce sychronuous compression API
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 05/10] crypto/lzo: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 08/10] crypto/842: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 10/10] crypto/testmgr: add new compression APIs test
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 09/10] crypto/deflate: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 07/10] crypto/lz4hc: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 06/10] crypto/lz4: support new compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 04/10] crypto/compress: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH v2 00/10] Introduce new async/sync compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 3/4] crypto: kdf - SP800-108 Key Derivation Function
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 2/4] crypto: kdf - add known answer tests
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 0/4] crypto: Key Derivation Function (SP800-108)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 4/4] crypto: kdf - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 1/4] crypto: add template handling for RNGs
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto : sha1-mb : Add missing args_digest offset
- From: Megha Dey <megha.dey@xxxxxxxxx>
- [PATCH 05/22] hw_random: Fix dependencies for !HAS_IOMEM archs
- From: Richard Weinberger <richard@xxxxxx>
- GCM: cra_name == cra_driver_name
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- AF_ALG: hash returns -ENOKEY
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [dm-devel] [PATCH 22/26] iscsi_tcp: Use ahash
- From: Mike Christie <michaelc@xxxxxxxxxxx>
- Re: [PATCH 1/2] n2rng: documentation, add DT bindings, vendor prefixes
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/4] crypto: sunxi - don't print uninitialized data
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: hash - select CRYPTO_HASH where needed
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: jitterentropy - always select CRYPTO_RNG
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: [PATCH 16/26] libceph: Use skcipher
- From: Ilya Dryomov <idryomov@xxxxxxxxx>
- [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 1/2] n2rng: documentation, add DT bindings, vendor prefixes
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- re: [PATCH] eCryptfs: Clean up crypto initialization
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: [PATCH] crypto: drbg - remove FIPS 140-2 continuous test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Reduced reqsize in qat_algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - enable LARGE_BURST for enhancing DMA transactions size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Pack cfg ctl structs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove redundant function call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - change name for c6xx dev type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ANSI X9.31 DRNG is not allowed in FIPS 140-2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: mxs-dcp - provide statesize and import/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: atmel-sha: fix algorihtm registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 25/26] sctp: Use shash
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 26/26] tcp: Use ahash
- From: David Miller <davem@xxxxxxxxxxxxx>
- [v2 PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/26] staging: rtl8192u: Use skcipher and ahash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 3/26] staging: rtl8192e: Replace uses of obsolete blkcipher and hash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 21/26] nfc: s3fwrn5: Use shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 24/26] nfsd: Use shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/26] dm crypt: Use skcipher and ahash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 7/26] wusb: Use skcipher
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/26] ppp_mppe: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/26] staging: rtl8192e: Replace uses of obsolete blkcipher and hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/26] dm crypt: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/26] wusb: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/26] ext4: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/26] f2fs: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/26] KEYS: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/26] mac802154: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/26] rxrpc: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/26] drbd: Use shash and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/26] iscsi_tcp: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/26] sctp: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/26] tcp: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/26] nfsd: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/26] iscsi-target: Use shash and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/26] nfc: s3fwrn5: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/26] lib80211: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/26] sunrpc: Use skcipher and ahash/shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/26] cifs: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/26] staging: rtl8192u: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/26] orinoco: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/26] crypto: Use skcipher and ahash/shash where possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: hash - Add crypto_has_ahash helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: api - Add crypto_type_has_alg helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] crypto: skcipher - Add helper to zero stack request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash - Add helpers to zero stack request/descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Non-destructive ChaCha20Poly1305 Decryption
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Crypto Fixes for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: drbg - remove FIPS 140-2 continuous test
- From: Stephan Mueller <sm@xxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: GPF in ChaCha20 SSSE3 Implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Eli Cooper <elicooper@xxxxxxx>
- GPF in ChaCha20 SSSE3 Implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: skcipher - Add default key size helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix crc32c soft dependency
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- [PATCH] Reduced reqsize in qat_algs
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: GPF in scatterwalk_start
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix crc32c soft dependency
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: linux-next/drivers/crypto/atmel-aes.c:282: possible missing break ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] hw_random: bcm63xx-rng: add device tree support
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 3/4] hw_random: bcm63xx-rng: allow building for BMIPS_GENERIC
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH] crypto: Fix crc32c soft dependency
- From: Jean Delvare <jdelvare@xxxxxxx>
- [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: lib: sw842: select crc32
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: qat - update init_esram for C3xxx dev type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [V3] crypto: qat - fix timeout issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/4] hw_random: bcm63xx-rng: allow building for BMIPS_GENERIC
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 2/4] hw_random: bcm63xx-rng: add device tree support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [V3] crypto: qat - fix timeout issues
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [v2 PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH 3/5] crypto: atmel-sha: add support of sama5d2x SoCs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 4/5] crypto: atmel-sha: fix context switches
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 5/5] crypto: atmel-sha: fix algorihtm registration
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 2/5] crypto: atmel-sha: fix a race between the 'done' tasklet and the crypto client
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 1/5] crypto: atmel-sha: fix crash when computing digest on empty message
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [v2 PATCH 2/2] crypto: algif_skcipher - Fix race condition in skcipher_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 1/2] crypto: algif_hash - Fix race condition in hash_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Kexec_file_load failed with "Missing required AuthAttr"
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Fix race condition in skcipher_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: algif_hash - Fix race condition in hash_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: lib: sw842: select crc32
- From: Dan Streetman <ddstreet@xxxxxxxx>
- lib: sw842: select crc32
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 1/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH v2 3/3] crypto: mxs-dcp - provide statesize and import/export()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 2/3] crypto: sahara - fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- crypto: use-after-free in skcipher_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in hash_sock_destruct_common
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Announce loop-AES-v3.7g file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- [PATCH 4/4] crypto: af_alg - Forbid bind(2) when nokey child sockets are present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_skcipher - Remove custom release parent function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: algif_hash - Remove custom release parent function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: af_alg - Allow af_af_alg_release_parent to be called on nokey path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in hash_sock_destruct_common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Use memcpy_toio for iomem annotated memory
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- crypto: use-after-free in hash_sock_destruct_common
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: caam - enable LARGE_BURST for enhancing DMA transactions size
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Pack cfg ctl structs
- From: Ahsan Atta <ahsan.atta@xxxxxxxxx>
- Re: [RFC PATCH 0/2] Crypto kernel TLS socket
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: skcipher - Add crypto_skcipher_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Use memcpy_toio for iomem annotated memory
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: zain <zain.wang@xxxxxxxxxxxxxx>
- Crypto Update for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <wzz@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- linux kernel (sparc), n2 rng for newer hardware
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: algif_hash bug?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: hash - Add crypto_ahash_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RESEND PATCH 1/2] crypto: sunxi-ss-cipher: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 2/2] crypto: sunxi-ss-hash: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Kexec_file_load failed with "Missing required AuthAttr"
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V3] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH V2] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove redundant function call
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - change name for c6xx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ANSI X9.31 DRNG is not allowed in FIPS 140-2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH RFC 2/7] crypto/compress: introduce sychronuous compression API
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 1/7] crypto/compress: remove unused pcomp interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 3/7] crypto: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 6/7] crypto/compress: add algorithm type specific flag, DECOMP_NOCTX
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 7/7] crypto/lzo: add CRYPTO_ALG_SCOMPRESS_DECOMP_NOCTX cra_flags
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 5/7] crypto: testmgr: add scompress/acompress test
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 4/7] crypto/lzo: support SCOMPRESS alg type
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- next-20151231 - aes crypto algorithm went missing?
- From: Valdis Kletnieks <Valdis.Kletnieks@xxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in rng_recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- crypto: deadlock in alg_setsockopt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Geliang Tang <geliangtang@xxxxxxx>
- crypto: use-after-free in rng_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/3] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/3] crypto: public_key: remove MPIs from public_key_signature struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [PATCH] crypto: 842 - remove WARN inside printk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v3 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: André Przywara <andre.przywara@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix some timeout tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: bad page state due to PF_ALG socket
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: use-after-free in skcipher_sock_destruct
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: 842 - remove WARN inside printk
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: [PATCH] Renaming dh895xcc mmp fw
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- ahash alg that does not implement import/export failed to register
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: AF_ALG -- add asymmetric cipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: algif_akcipher - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: AF_ALG -- add sign/verify API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 20/24] crypto: atmel-aes: fix atmel-ctr-aes driver for RFC 3686
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 23/24] crypto: atmel-aes: add support to GCM mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 24/24] crypto: atmel-aes: add debug facilities to monitor register accesses.
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 21/24] crypto: atmel-aes: fix the counter overflow in CTR mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 22/24] crypto: atmel-aes: change the DMA threshold
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 19/24] crypto: atmel-aes: create sections to regroup functions by usage
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 18/24] crypto: atmel-aes: fix typo and indentation
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 17/24] crypto: atmel-aes: use SIZE_IN_WORDS() helper macro
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 16/24] crypto: atmel-aes: improve performances of data transfer
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 01/24] crypto: atmel-aes: add new version
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 02/24] crypto: atmel-aes: constify value argument of atmel_aes_write_n()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 13/24] crypto: atmel-aes: reduce latency of DMA completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 15/24] crypto: atmel-aes: fix atmel_aes_remove()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 14/24] crypto: atmel-aes: remove useless AES_FLAGS_DMA flag
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 12/24] crypto: atmel-aes: remove unused 'err' member of struct atmel_aes_dev
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 09/24] crypto: atmel-aes: remove useless write in the Control Register
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 11/24] crypto: atmel-aes: rework crypto request completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 10/24] crypto: atmel-aes: simplify the configuration of the AES IP
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 04/24] crypto: atmel-aes: fix unregistration order of crypto algorithms
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 08/24] crypto: atmel-aes: make crypto request queue management more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 05/24] crypto: atmel-aes: remove unused header includes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 06/24] crypto: atmel-aes: propagate error from atmel_aes_hw_version_init()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 07/24] crypto: atmel-aes: change atmel_aes_write_ctrl() signature
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 03/24] crypto: atmel-aes: change algorithm priorities
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- GPF in gf128mul_64k_bbe
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- bad page state due to PF_ALG socket
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in skcipher_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- RE: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: "Yang, Pingchao" <pingchao.yang@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: walter harms <wharms@xxxxxx>
- [PATCH] crypto: qat - fix some timeout tests
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: add algif_akcipher user space API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - enable VF irq after guest exits ungracefully
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- [PATCH 2/2] crypto: omap-aes,omap-des: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Fabrizio Demaria <fabrizio.f.demaria@xxxxxxxxx>
- [RFC PATCH V4] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] keys, trusted: select hash algorithm for TPM2 chips
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] TPM 2.0 trusted key features for v4.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys/signature.c does not need <module.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - select PCI_IOV when VF are enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - ring returning retry even though ring has BW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara: fix 64-bit dma_addr_t compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]