Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] Reduced reqsize in qat_algs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: caam - enable LARGE_BURST for enhancing DMA transactions size
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Pack cfg ctl structs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - remove redundant function call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - change name for c6xx dev type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ANSI X9.31 DRNG is not allowed in FIPS 140-2
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] crypto: mxs-dcp - provide statesize and import/export()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_hash: creating 0 sized array in hash_accept
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: algif_hash: creating 0 sized array in hash_accept
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] crypto: atmel-sha: fix algorihtm registration
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH 25/26] sctp: Use shash
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 26/26] tcp: Use ahash
- From: David Miller <davem@xxxxxxxxxxxxx>
- [v2 PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/26] staging: rtl8192u: Use skcipher and ahash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 3/26] staging: rtl8192e: Replace uses of obsolete blkcipher and hash
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 21/26] nfc: s3fwrn5: Use shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 24/26] nfsd: Use shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/26] dm crypt: Use skcipher and ahash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 7/26] wusb: Use skcipher
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 1/26] block: cryptoloop - Use new skcipher interface
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/26] ppp_mppe: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/26] staging: rtl8192e: Replace uses of obsolete blkcipher and hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/26] dm crypt: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/26] wusb: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 9/26] eCryptfs: Use skcipher and shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/26] ext4: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/26] f2fs: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 14/26] KEYS: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 15/26] Bluetooth: Use skcipher and hash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 17/26] mac802154: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 18/26] rxrpc: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 20/26] drbd: Use shash and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 22/26] iscsi_tcp: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 25/26] sctp: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 26/26] tcp: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 24/26] nfsd: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 23/26] iscsi-target: Use shash and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/26] nfc: s3fwrn5: Use shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 19/26] ipsec: Use skcipher and ahash when probing algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 16/26] libceph: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/26] lib80211: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/26] sunrpc: Use skcipher and ahash/shash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 8/26] cifs: Use skcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/26] staging: rtl8192u: Use skcipher and ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/26] orinoco: Use ahash
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/26] crypto: Use skcipher and ahash/shash where possible
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: hash - Add crypto_has_ahash helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: api - Add crypto_type_has_alg helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Horia Ioan Geanta Neag <horia.geanta@xxxxxxx>
- Re: [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Nicolas Ferre <nicolas.ferre@xxxxxxxxx>
- [PATCH] crypto: skcipher - Add helper to zero stack request
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hash - Add helpers to zero stack request/descriptor
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Non-destructive ChaCha20Poly1305 Decryption
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Crypto Fixes for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: drbg - remove FIPS 140-2 continuous test
- From: Stephan Mueller <sm@xxxxxxxx>
- Re: [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Martin Willi <martin@xxxxxxxxxxxxxx>
- Re: GPF in ChaCha20 SSSE3 Implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: chacha20_4block_xor_ssse3: Align stack pointer to 64 bytes
- From: Eli Cooper <elicooper@xxxxxxx>
- GPF in ChaCha20 SSSE3 Implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] crypto: skcipher - Add default key size helper
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Fix crc32c soft dependency
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- [PATCH] Reduced reqsize in qat_algs
- From: Giovanni Cabiddu <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: GPF in scatterwalk_start
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: GPF in scatterwalk_start
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] crypto: Fix crc32c soft dependency
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: aesni-intel - avoid IPsec re-ordering
- From: Raj Ammanur <rammanur@xxxxxxxxxx>
- Re: [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: linux-next/drivers/crypto/atmel-aes.c:282: possible missing break ?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] hw_random: bcm63xx-rng: add device tree support
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 3/4] hw_random: bcm63xx-rng: allow building for BMIPS_GENERIC
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH] crypto: Fix crc32c soft dependency
- From: Jean Delvare <jdelvare@xxxxxxx>
- [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
- From: Peter Jones <pjones@xxxxxxxxxx>
- [PATCH] crypto: ixp4xx: avoid uninitialized variable use
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: lib: sw842: select crc32
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: qat - update init_esram for C3xxx dev type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [V3] crypto: qat - fix timeout issues
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] crypto: af_alg - add async support to algif_aead
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 3/4] hw_random: bcm63xx-rng: allow building for BMIPS_GENERIC
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 4/4] hw_random: brcm63xx-rng: document device tree bindings
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 1/4] hw_random: bcm63xx-rng: remove unused variables
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- [PATCH 2/4] hw_random: bcm63xx-rng: add device tree support
- From: Álvaro Fernández Rojas <noltari@xxxxxxxxx>
- Re: [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] crypto: af_alg - add async support to algif_aead
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [V3] crypto: qat - fix timeout issues
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- crypto: slab-out-of-bounds in skcipher_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [v2 PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH 3/5] crypto: atmel-sha: add support of sama5d2x SoCs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 4/5] crypto: atmel-sha: fix context switches
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 5/5] crypto: atmel-sha: fix algorihtm registration
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 2/5] crypto: atmel-sha: fix a race between the 'done' tasklet and the crypto client
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 1/5] crypto: atmel-sha: fix crash when computing digest on empty message
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 0/5] crypto: atmel-sha: fix registration issue and other bugs
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [v2 PATCH 2/2] crypto: algif_skcipher - Fix race condition in skcipher_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 1/2] crypto: algif_hash - Fix race condition in hash_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [v2 PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Kexec_file_load failed with "Missing required AuthAttr"
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Fix race condition in skcipher_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: algif_hash - Fix race condition in hash_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] crypto: Fix race condition in *_check_key
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.3.y] crypto: fix test vector for rsa
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: lib: sw842: select crc32
- From: Dan Streetman <ddstreet@xxxxxxxx>
- lib: sw842: select crc32
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 0/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 2/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH 1/2] n2rng: Attach on T5/M5, T7/M7 SPARC CPUs
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH v2 3/3] crypto: mxs-dcp - provide statesize and import/export()
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 2/3] crypto: sahara - fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH v2 1/3] crypto: sahara - avoid needlessly saving and restoring sahara_ctx
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] crypto: sahara: Fill the statesize field
- From: Fabio Estevam <festevam@xxxxxxxxx>
- crypto: use-after-free in skcipher_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in hash_sock_destruct_common
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Announce loop-AES-v3.7g file/swap crypto package
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- [PATCH 4/4] crypto: af_alg - Forbid bind(2) when nokey child sockets are present
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] crypto: algif_skcipher - Remove custom release parent function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] crypto: algif_hash - Remove custom release parent function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: af_alg - Allow af_af_alg_release_parent to be called on nokey path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in hash_sock_destruct_common
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: s5p-sss - Use memcpy_toio for iomem annotated memory
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Vladimir Zapolskiy <vz@xxxxxxxxx>
- crypto: use-after-free in hash_sock_destruct_common
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v1] crypto: ccp - Add hash state import and export support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 2/2] crypto: caam - enable LARGE_BURST for enhancing DMA transactions size
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 1/2] crypto: caam - make write transactions bufferable on PPC platforms
- From: Horia Geantă <horia.geanta@xxxxxxx>
- [PATCH 0/2] crypto: caam - performance fixes/improvements
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: ablk_decrypt causes BUG in scatterwalk
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: "Li, Weigang" <weigang.li@xxxxxxxxx>
- Re: [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Pack cfg ctl structs
- From: Ahsan Atta <ahsan.atta@xxxxxxxxx>
- Re: [RFC PATCH 0/2] Crypto kernel TLS socket
- From: Nikos Mavrogiannopoulos <nmav@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add key check exception for cipher_null
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: skcipher - Add crypto_skcipher_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: s5p-sss - Use memcpy_toio for iomem annotated memory
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- [PATCH 1/2] crypto: s5p-sss - Fix minor coding style violations
- From: Krzysztof Kozlowski <k.kozlowski.k@xxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: zain <zain.wang@xxxxxxxxxxxxxx>
- Crypto Update for 4.5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <wzz@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- linux kernel (sparc), n2 rng for newer hardware
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- Re: algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: algif_hash bug?
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- algif_hash bug?
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - update init_esram for C3xxx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_hash - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: hash - Add crypto_ahash_has_setkey
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RESEND PATCH 1/2] crypto: sunxi-ss-cipher: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 2/2] crypto: sunxi-ss-hash: promote variables to match types in min3() calls
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RESEND PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 0/2] crypto: sunxi-ss: fix 64-bit compilation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Kexec_file_load failed with "Missing required AuthAttr"
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH V3] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH V2] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - remove redundant function call
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix timeout issues
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - change name for c6xx dev type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ANSI X9.31 DRNG is not allowed in FIPS 140-2
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: Make CRYPTO_CBC select CRYPTO_ECHAINIV
- From: Thomas Egerer <hakke_007@xxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH RFC 2/7] crypto/compress: introduce sychronuous compression API
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 1/7] crypto/compress: remove unused pcomp interface
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 3/7] crypto: add asynchronous compression support
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 6/7] crypto/compress: add algorithm type specific flag, DECOMP_NOCTX
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 7/7] crypto/lzo: add CRYPTO_ALG_SCOMPRESS_DECOMP_NOCTX cra_flags
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 5/7] crypto: testmgr: add scompress/acompress test
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 4/7] crypto/lzo: support SCOMPRESS alg type
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH RFC 0/7] Introduce new async/sync compression APIs
- From: Joonsoo Kim <js1304@xxxxxxxxx>
- [PATCH 2/2] crypto: algif_skcipher - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: af_alg - Add nokey compatibility path
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- next-20151231 - aes crypto algorithm went missing?
- From: Valdis Kletnieks <Valdis.Kletnieks@xxxxxx>
- Re: next-20151231 - aes crypto algorithm went missing?
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in rng_recvmsg
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: use-after-free in alg_bind
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- crypto: use-after-free in alg_bind
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- crypto: deadlock in alg_setsockopt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: use-after-free in hash_sock_destruct
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
- From: Geliang Tang <geliangtang@xxxxxxx>
- crypto: use-after-free in rng_recvmsg
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Maxime Ripard <maxime.ripard@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: relocate ALG_MAX_PAGES to uapi
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] crypto: algif_skcipher - Require setkey before accept(2)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: crypto: algif_skcipher - Require setkey before accept(2)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/3] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 3/3] crypto: public_key: remove MPIs from public_key_signature struct
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/3] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - fix SKU definiftion for c3xxx dev
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [linux-next:master 4796/5585] adf_vf_isr.c:undefined reference to `adf_enable_pf2vf_interrupts'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] crypto: KEYS: convert public key and digsig asym to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: ccp - use to_pci_dev and to_platform_device
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: [PATCH] crypto: 842 - remove WARN inside printk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v3 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: André Przywara <andre.przywara@xxxxxxx>
- Re: [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - Rename dh895xcc mmp firmware
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix some timeout tests
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/5] crypto: sunxi-ss: fix min3() call to match types
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RFC PATCH 3/5] crypto: sunxi-ss: fix dev_dbg() output type
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: bad page state due to PF_ALG socket
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: GPF in lrw_crypt
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: use-after-free in skcipher_sock_destruct
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: AF_ALG - add support for keys/asymmetric-type
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- [PATCH] crypto: 842 - remove WARN inside printk
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: [PATCH] Renaming dh895xcc mmp fw
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] Renaming dh895xcc mmp fw
- From: "Atta, Ahsan" <ahsan.atta@xxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- Re: ahash alg that does not implement import/export failed to register
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- ahash alg that does not implement import/export failed to register
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: AF_ALG -- add setpubkey setsockopt call
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 3/4] crypto: AF_ALG -- add asymmetric cipher interface
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 4/4] crypto: algif_akcipher - enable compilation
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 1/4] crypto: AF_ALG -- add sign/verify API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH v3 0/4] crypto: add algif_akcipher user space API
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH 20/24] crypto: atmel-aes: fix atmel-ctr-aes driver for RFC 3686
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 23/24] crypto: atmel-aes: add support to GCM mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 24/24] crypto: atmel-aes: add debug facilities to monitor register accesses.
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 21/24] crypto: atmel-aes: fix the counter overflow in CTR mode
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 22/24] crypto: atmel-aes: change the DMA threshold
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 19/24] crypto: atmel-aes: create sections to regroup functions by usage
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 18/24] crypto: atmel-aes: fix typo and indentation
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 17/24] crypto: atmel-aes: use SIZE_IN_WORDS() helper macro
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 16/24] crypto: atmel-aes: improve performances of data transfer
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 01/24] crypto: atmel-aes: add new version
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 02/24] crypto: atmel-aes: constify value argument of atmel_aes_write_n()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 13/24] crypto: atmel-aes: reduce latency of DMA completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 15/24] crypto: atmel-aes: fix atmel_aes_remove()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 14/24] crypto: atmel-aes: remove useless AES_FLAGS_DMA flag
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 12/24] crypto: atmel-aes: remove unused 'err' member of struct atmel_aes_dev
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 09/24] crypto: atmel-aes: remove useless write in the Control Register
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 11/24] crypto: atmel-aes: rework crypto request completion
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 10/24] crypto: atmel-aes: simplify the configuration of the AES IP
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 04/24] crypto: atmel-aes: fix unregistration order of crypto algorithms
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 08/24] crypto: atmel-aes: make crypto request queue management more generic
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 05/24] crypto: atmel-aes: remove unused header includes
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 06/24] crypto: atmel-aes: propagate error from atmel_aes_hw_version_init()
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 07/24] crypto: atmel-aes: change atmel_aes_write_ctrl() signature
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 03/24] crypto: atmel-aes: change algorithm priorities
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- [PATCH 00/24] crypto: atmel-aes: global rework of the driver
- From: Cyrille Pitchen <cyrille.pitchen@xxxxxxxxx>
- Re: GPF in gf128mul_64k_bbe
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- GPF in gf128mul_64k_bbe
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in hash_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- GPF in lrw_crypt
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- bad page state due to PF_ALG socket
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- use-after-free in skcipher_sock_destruct
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v4 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v4 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: qat - use list_for_each_entry*
- From: Geliang Tang <geliangtang@xxxxxxx>
- RE: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: "Yang, Pingchao" <pingchao.yang@xxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: walter harms <wharms@xxxxxx>
- [PATCH] crypto: qat - fix some timeout tests
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Yang Pingchao <pingchao.yang@xxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [patch] crypto: qat - fix some timeout tests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] net: fix uninitialized variable issue
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] net: fix uninitialized variable issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v3 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [patch] crypto: qat - fix some timeout tests
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 0/5] crypto: add algif_akcipher user space API
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: qat - enable VF irq after guest exits ungracefully
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: atmel-sha: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- [PATCH 2/2] crypto: omap-aes,omap-des: Removed unused variable "err"
- From: "Pathak, Rahul (R.)" <rpathak@xxxxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Fabrizio Demaria <fabrizio.f.demaria@xxxxxxxxx>
- [RFC PATCH V4] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v2 2/3] keys, trusted: select hash algorithm for TPM2 chips
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] TPM 2.0 trusted key features for v4.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] crypto/nx842: Mask XERS0 bit in return value
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: Crypto/nx842: Ignore invalid XER[S0] return error
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: asymmetric_keys/signature.c does not need <module.h>
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - select PCI_IOV when VF are enabled
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - ring returning retry even though ring has BW
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] crypto: add precalculated hash for zero message length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rsa-padding - don't allocate buffer on stack
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Crypto/nx842: Ignore invalid XER[S0] return error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qat - fix CTX_ENABLES bits shift direction issue
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: "crypto_hash_setkey" call from atomic context
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sahara: fix 64-bit dma_addr_t compilation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: constify drbg_state_ops structures
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: crypto: qat - add support for new devices to FW loader
- From: "Yang, Pingchao" <pingchao.yang@xxxxxxxxx>
- [RFC PATCH V3] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- re: crypto: qat - add support for new devices to FW loader
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [patch -next] crypto: qat - uint8_t is not large enough for accel_id
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [cryptodev:master 50/54] adf_c3xxxvf_hw_data.c:undefined reference to `adf_iov_putmsg'
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Sam Protsenko <semen.protsenko@xxxxxxxxxxxxxxx>
- Re: WARNING in crypto_wait_for_test
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [PATCH] crypto: omap-des: Fix "schedule while atomic" bug
- From: Semen Protsenko <semen.protsenko@xxxxxxxxxx>
- "crypto_hash_setkey" call from atomic context
- From: Fabrizio Demaria <fabrizio.f.demaria@xxxxxxxxx>
- [PATCH v2] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [cryptodev:master 53/54] crypto/rsa-pkcs1pad.c:135:1: warning: 'pkcs1pad_encrypt_sign_complete' uses dynamic stack allocation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: KEYS: convert public key to the akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/2] integrity: convert digsig to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/2] crypto: KEYS: convert public key to akcipher api
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 50/54] adf_c3xxxvf_hw_data.c:undefined reference to `adf_iov_putmsg'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH] crypto: asymmetric_keys/signature.c does not need <module.h>
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH] crypto: qat - select PCI_IOV when VF are enabled
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - enable VF irq after guest exits ungracefully
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] crypto: qat - ring returning retry even though ring has BW
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [cryptodev:master 53/54] crypto/rsa-pkcs1pad.c:135:1: warning: 'pkcs1pad_encrypt_sign_complete' uses dynamic stack allocation
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- [cryptodev:master 51/54] drivers/crypto/qat/qat_c62xvf/adf_drv.c:116:57: error: 'struct pci_dev' has no member named 'physfn'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Horia Geantă <horia.geanta@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] chacha20poly1305: Skip encryption/decryption for 0-len
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] blkcipher: Copy iv from desc even for 0-len walks
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add support for qat_c3xxx and qat_c62x devices
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: fix kernel-doc warnings in crypto/aead.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [RFC PATCH V2] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: sahara: fix debug output for 64-bit dma_addr_t
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 1/2] crypto: sahara: fix 64-bit dma_addr_t compilation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- WARNING in crypto_wait_for_test
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v2 1/4] crypto: hash: add zero length message hash for shax and md5
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 2/4] crypto: niagara: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 3/4] crypto: ccp: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 4/4] crypto: ux500: Use precalculated hash from headers
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH v2 0/4] crypto: add precalculated hash for zero message length
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h
- From: LABBE Corentin <clabbe.montjoie@xxxxxxxxx>
- Re: [PATCH RFC 00/13] Further iMX CAAM updates
- From: Fabio Estevam <festevam@xxxxxxxxx>
- [PATCH] crypto: constify drbg_state_ops structures
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Dan Streetman <ddstreet@xxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Dan Streetman <ddstreet@xxxxxxxx>
- [PATCH RFC 11/11] crypto: caam: get rid of tasklet
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 10/11] crypto: caam: add ahash_edesc_add_src()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 09/11] crypto: caam: move job descriptor initialisation to ahash_edesc_alloc()
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 08/11] crypto: caam: add ahash_edesc_alloc() for descriptor allocation
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 07/11] crypto: caam: check and use dma_map_sg() return code
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 06/11] crypto: caam: ensure that we clean up after an error
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 05/11] crypto: caam: replace sec4_sg pointer with array
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 04/11] crypto: caam: mark the hardware descriptor as cache line aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 03/11] crypto: caam: incorporate job descriptor into struct ahash_edesc
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 02/11] crypto: caam: ensure descriptor buffers are cacheline aligned
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 01/11] crypto: caam: fix DMA API mapping leak
- From: Russell King <rmk+kernel@xxxxxxxxxxxxxxxx>
- [PATCH RFC 00/13] Further iMX CAAM updates
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: crypto/nx842: Ignore queue overflow informative error
- From: Daniel Axtens <dja@xxxxxxxxxx>
- crypto/nx842: Ignore queue overflow informative error
- From: Haren Myneni <haren@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] chacha20poly1305: Skip encryption/decryption for 0-len
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 1/2] blkcipher: Copy iv from desc even for 0-len walks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v7 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v7 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Corentin LABBE <clabbe.montjoie@xxxxxxxxx>
- Re: [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- [RFC PATCH] Crypto: rockchip/crypto - add hash support for crypto engine in rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Crypto Fixes for 4.4
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] crypto: qat - add support for c62xvf accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 6/7] crypto: qat - add support for c3xxxvf accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 4/7] crypto: qat - add support for c3xxx accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 5/7] crypto: qat - add support for c62x accel type
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 3/7] crypto: qat - move isr files to qat common so that they can be reused
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 2/7] crypto: qat - add support for new devices to FW loader
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 1/7] crypto: qat - add new device definitions
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH 0/7] Add support for qat_c3xxx and qat_c62x devices
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] crypto: talitos - add new crypto modes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] IV size failing on skcipher API
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - pass the correct buffer length
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: Fix driver load failure
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: rockchip/crypto - fix possible deadlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] hw_random: core, sleep interruptible in read
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sandy Harris <sandyinchina@xxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] crypto: fix kernel-doc warnings in crypto/aead.h
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- Re: ipsec impact on performance
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- [PATCH v4 3/5] crypto: AES CBC multi-buffer scheduler
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 4/5] crypto: AES CBC by8 encryption
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/5] crypto: AES CBC multi-buffer data structures
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/5] crypto: x86 AES-CBC encryption with multibuffer
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/5] crypto: Multi-buffer encryption infrastructure support
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [RFC] KEYS: Exposing {a,}symmetric key ops to userspace and other bits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: n2 - Use platform_register/unregister_drivers()
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- RE: ipsec impact on performance
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: ipsec impact on performance
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Ahern <dsa@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: David Ahern <dsa@xxxxxxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: ipsec impact on performance
- From: Tom Herbert <tom@xxxxxxxxxxxxxxx>
- Re: ipsec impact on performance
- From: Rick Jones <rick.jones2@xxxxxxx>
- [PATCH RFC] Defer xfrm to be done post-GSO
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- ipsec impact on performance
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- [PATCH] crypto: talitos - add new crypto modes
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 2/2] Removing VRSAVE save and restore
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] IV size failing on skcipher API
- From: Leonidas Da Silva Barbosa <leosilva@xxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: caam - pass the correct buffer length
- From: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] dmaengine: Add supports for APM X-Gene SoC CRC32C accerlerator driver
- From: Rameshwar Sahu <rsahu@xxxxxxx>
- [PATCH 1/2] crypto: ghash-clmulni - Fix load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH 2/2] crypto: cryptd - Assign statesize properly
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH 0/2] crypto: Fix driver load failure
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH v6 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v6 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v2] crypto: rockchip/crypto - fix possible deadlock
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH] crypto: rockchip/crypto - fix possible deadlock
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: rockchip/crypto - fix possible deadlock
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v5 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v2] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH] crypto/cryptod: use crypto_skcipher_type() for getting skcipher type
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hw_random: core, sleep interruptible in read
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: ahash and halg.statesize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v5 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH] hw_random: core, sleep interruptible in read
- From: Jiri Slaby <jslaby@xxxxxxx>
- [PATCH] crypto: mxs-dcp - Initialize .statesize fields
- From: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx>
- ahash and halg.statesize
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Marek Vasut <marex@xxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: mxs-dcp: Failed to register sha1 hash
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- mxs-dcp: Failed to register sha1 hash
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: ghash-clmulni: does not load
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- ghash-clmulni: does not load
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v4 4/4] crypto: RSA padding algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] updating for keypayload null check.
- From: Ameen <ameenali023@xxxxxxxxx>
- [PATCH] crypto/cryptod: use crypto_skcipher_type() for getting skcipher type
- From: Alexander Kuleshov <kuleshovmail@xxxxxxxxx>
- [PATCH v4 4/4] crypto: RSA padding algorithm
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 3/4] crypto: akcipher: add akcipher declarations needed by templates.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 2/4] crypto: rsa: only require output buffers as big as needed.
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- [PATCH v4 1/4] lib/mpi: only require buffers as big as needed for the integer
- From: Andrew Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH 2/2] ath9k: export HW random number generator
- From: Kalle Valo <kvalo@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH v5 0/4] crypto: add crypto accelerator support for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 3/4] Crypto: rockchip/crypto - add crypto driver for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 1/4] crypto: rockchip/crypto - add DT bindings documentation
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 4/4] ARM: dts: rockchip: Add Crypto node for rk3288
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- [PATCH v5 2/4] clk: rockchip: set an ID for crypto clk
- From: Zain Wang <zain.wang@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] crypto: akcipher: add akcipher declarations useful for templates.
- From: Andrzej Zaborowski <andrew.zaborowski@xxxxxxxxx>
- Re: [PATCH v3 5/5] crypto: AES CBC multi-buffer glue code
- From: Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Phil Sutter <phil@xxxxxx>
- Re: [RFC PATCH 2/2] Crypto kernel tls socket
- From: Sowmini Varadhan <sowmini.varadhan@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]