Linux Crypto
[Prev Page][Next Page]
- Re: [PATCH] crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 11/22] crypto: amlogic - Introduce hasher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 29/29] crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 28/29] crypto: scatterwalk - remove obsolete functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 26/29] net/tls: use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 27/29] crypto: skcipher - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 25/29] crypto: x86/aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 24/29] crypto: x86/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 23/29] crypto: stm32 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 22/29] crypto: s5p-sss - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 21/29] crypto: s390/aes-gcm - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 20/29] crypto: nx - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 19/29] crypto: keywrap - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 18/29] crypto: arm64 - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 17/29] crypto: arm/ghash - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 16/29] crypto: aegis - use the new scatterwalk functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 14/29] crypto: scatterwalk - add new functions for copying data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 15/29] crypto: skcipher - use scatterwalk_start_at_pos()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 11/29] crypto: scatterwalk - move to next sg entry just in time
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/29] crypto: skcipher - call cond_resched() directly
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 12/29] crypto: scatterwalk - add new functions for skipping data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/29] crypto: omap - switch from scatter_walk to plain offset
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/29] crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/29] crypto: skcipher - clean up initialization of skcipher_walk::flags
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/29] crypto: skcipher - remove unnecessary page alignment of bounce buffer
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/29] crypto: skcipher - remove redundant clamping to page size
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/29] crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/29] crypto: skcipher - document skcipher_walk_done() and rename some vars
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/29] crypto: scatterlist handling improvements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 09/12] crypto: iaa - Distribute compress jobs from all cores to all IAAs on a package.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 12/12] mm: zswap: Compress batching with Intel IAA in zswap_store() of large folios.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 08/12] crypto: iaa - Map IAA devices/wqs to cores based on packages instead of NUMA.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 07/12] crypto: iaa - Re-organize the iaa_crypto driver code.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 06/12] crypto: iaa - Disable iaa_verify_compress by default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 05/12] crypto: iaa - Make async mode the default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 04/12] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 03/12] crypto: iaa - Add an acomp_req flag CRYPTO_ACOMP_REQ_POLL to enable async mode.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 01/12] crypto: acomp - Add synchronous/asynchronous acomp request chaining.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v5 00/12] zswap IAA compress batching
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/4] arm64: dts: qcom: ipq5332: update TRNG compatible
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v2 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 4/4] arm64: dts: qcom: ipq5332: update TRNG compatible
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 2/4] arm64: dts: qcom: ipq5424: add TRNG node
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v2 0/4] Enable TRNG support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 11/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 02/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 04/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v1] drivers/crypto/ccp: change signature of sp_init()
- From: Denis Plotnikov <den-plotnikov@xxxxxxxxxxxxxx>
- Re: [PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v8 3/3] s390/crypto: Enable phmac selftest invocation
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 1/3] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 2/3] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v8 0/3] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 6/7] crypto: tegra: Fix CMAC intermediate result handling
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 4/7] crypto: tegra: Transfer HASH init function to crypto engine
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 7/7] crypto: tegra: Set IV to NULL explicitly for AES ECB
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 5/7] crypto: tegra: Fix HASH intermediate result handling
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 0/7] Tegra Security Engine driver improvements
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 2/7] crypto: tegra: Do not use fixed size buffers
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- [PATCH 3/7] crypto: tegra: check retrun value for hash do_one_req
- From: Akhil R <akhilrajeev@xxxxxxxxxx>
- Re: [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Bartosz Golaszewski <bartosz.golaszewski@xxxxxxxxxx>
- Re: next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- [PATCH] crypto: ixp4xx: fix OF node reference leaks in init_ixp_crypto()
- From: Joe Hattori <joe@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v9 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 0/8] crypto: more alignmask cleanups
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v11 03/22] crypto: amlogic - Remove clock input
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 06/22] crypto: amlogic - Drop status field from meson_flow
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 02/22] crypto: amlogic - Add platform data
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 04/22] crypto: amlogic - Add MMIO helpers
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 00/22] Support more Amlogic SoC families in crypto driver
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 01/22] crypto: amlogic - Don't hardcode IRQ count
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 05/22] crypto: amlogic - Move get_engine_number()
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 22/22] arm64: dts: amlogic: axg: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 21/22] arm64: dts: amlogic: g12: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 20/22] arm64: dts: amlogic: s4: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 19/22] arm64: dts: amlogic: a1: add crypto node
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 17/22] dt-bindings: crypto: amlogic,gxl-crypto: support new SoC's
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 18/22] arm64: dts: amlogic: gxl: correct crypto node definition
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 16/22] dt-bindings: crypto: amlogic,gxl-crypto: correct clk and interrupt lines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 15/22] crypto: amlogic - Add support for A1-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 14/22] crypto: amlogic - Add support for AXG-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 13/22] crypto: amlogic - Add support for G12-series
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 12/22] crypto: amlogic - Use fallback for 192-bit keys
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 11/22] crypto: amlogic - Introduce hasher
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 07/22] crypto: amlogic - Move algs definition and cipher API to cipher.c
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 09/22] crypto: amlogic - Process more than MAXDESCS descriptors
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 10/22] crypto: amlogic - Avoid kzalloc in engine thread
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- [PATCH v11 08/22] crypto: amlogic - Cleanup defines
- From: Alexey Romanov <avromanov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] crypto: hisilicon - fix the authsize and icv problems of aead in sec
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v5 1/2] crypto: hisilicon/sec2 - fix for aead icv error
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v5 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/19] Wire up CRC32 library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 00/12] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 7/8] crypto: x86/aes-xts - more code size optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 4/8] crypto: x86/aes-xts - make the register aliases per-function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 0/8] crypto: x86 - minor optimizations and cleanup to VAES code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 5/8] crypto: x86/aes-xts - improve some comments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 8/8] crypto: x86/aes-xts - additional optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 6/8] crypto: x86/aes-xts - change len parameter to int
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 2/8] crypto: x86/aes-gcm - tune better for AMD CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 1/8] crypto: x86/aes-gcm - code size optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 3/8] crypto: x86/aes-xts - use .irp when useful
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5.4 243/321] x86/asm/crypto: Annotate local functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/12] crypto: qce - Convert register r/w for skcipher via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 00/12] dmaengine: qcom: bam_dma: add cmd descriptor support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 12/12] crypto: qce - Add support for lock/unlock in aead
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 11/12] crypto: qce - Add support for lock/unlock in sha
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 10/12] crypto: qce - Add support for lock/unlock in skcipher
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 09/12] crypto: qce - Add LOCK and UNLOCK flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 08/12] crypto: qce - Convert register r/w for aead via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 07/12] crypto: qce - Convert register r/w for sha via BAM/DMA
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 05/12] crypto: qce - Add bam dma support for crypto register r/w
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 04/12] crypto: qce - Add support for crypto address read
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 03/12] dmaengine: qcom: bam_dma: add bam_pipe_lock flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 02/12] dmaengine: add DMA_PREP_LOCK and DMA_PREP_UNLOCK flag
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH v5 01/12] dmaengine: qcom: bam_dma: Add bam_sw_version register read
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
- Re: [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH 7/7] crypto: x86/aes-xts - more code size optimizations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/7] crypto: x86/aes-xts - improve some comments
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/7] crypto: x86/aes-xts - change len parameter to int
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/7] crypto: x86/aes-xts - make the register aliases per-function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/7] crypto: x86/aes-xts - use .irp when useful
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/7] crypto: x86/aes-gcm - tune better for AMD CPUs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/7] crypto: x86/aes-gcm - code size optimization
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/7] crypto: x86 - minor optimizations and cleanup to VAES code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v8 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH] FIPS kernels should default to fips mode
- From: Atharva Tiwari <evepolonium@xxxxxxxxx>
- Re: [PATCH] crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: caam - use JobR's space to access page 0 regs
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 1/2] dt-bindings: crypto: qcom,prng: document QCS8300
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] crypto: hisilicon - add data aggregation feature
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tegra - do not transfer req when tegra init fails
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: cctrng: Add cancel_work_sync before module remove
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add KUnit tests for curve25519
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH 0/7] Move initializing SEV/SNP functionality to KVM
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [no subject]
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH v7 1/2] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v7 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v7 0/2] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 0/8] crypto: more alignmask cleanups
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/11] dmaengine: qcom: bam_dma: add LOCK & UNLOCK flag support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- [PATCH] Add KUnit tests for curve25519
- From: Enzo Bertoloti <ebertoloti@xxxxxxxxxx>
- Re: [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- [no subject]
- [PATCHv3] gcc: disable '-Wstrignop-overread' universally for gcc-13+ and FORTIFY_SOURCE
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- [PATCH 7/8] crypto: aegis - remove assignments of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 8/8] crypto: keywrap - remove assignment of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 6/8] crypto: x86 - remove assignments of 0 to cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/8] crypto: khazad - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/8] crypto: seed - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/8] crypto: tea - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/8] crypto: aria - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/8] crypto: more alignmask cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/8] crypto: anubis - stop using cra_alignmask
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/2] crypto: drivers - remove Niagara2 SPU driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/2] crypto: skcipher - remove support for physical address walks
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/2] crypto: remove physical address support in skcipher_walk
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [no subject]
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: chenridong <chenridong@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: chenridong <chenridong@xxxxxxxxxx>
- Re: [PATCH] padata: Fix refcnt handling in padata_free_shell() again
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: Daniel Jordan <daniel.m.jordan@xxxxxxxxxx>
- Re: [PATCH V2 2/2] arm64: dts: qcom: qcs8300: add QCrypto nodes
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCHv2] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- Re: [PATCH] cpumask: work around false-postive stringop-overread errors
- From: Nilay Shroff <nilay@xxxxxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- [no subject]
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH] cpumask: work around false-postive stringop-overread errors
- From: Brian Norris <briannorris@xxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tegra - do not transfer req when tegra init fails
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [PATCH v4 02/11] dmaengine: qcom: bam_dma: add LOCK & UNLOCK flag support
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/9] crypto: qce - refactor the driver
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: Stephan Gerhold <stephan.gerhold@xxxxxxxxxx>
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH] crypto: qce - fix priority to be less than ARMv8 CE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] padata: Fix refcnt handling in padata_free_shell() again
- From: Zach Wade <zachwade.k@xxxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] crypto: ccp: Use scoped guard for mutex
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 8/9] crypto: qce - convert tasklet to workqueue
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 1/9] crypto: qce - fix goto jump in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 9/9] crypto: qce - switch to using a mutex
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] crypto: qce - make qce_register_algs() a managed interface
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 7/9] crypto: qce - use __free() for a buffer that's always freed
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 5/9] crypto: qce - convert qce_dma_request() to use devres
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: neil.armstrong@xxxxxxxxxx
- Re: [PATCH 3/9] crypto: qce - remove unneeded call to icc_set_bw() in error path
- From: neil.armstrong@xxxxxxxxxx
- [PATCH 06/10] nvme: always include <linux/key.h>
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 07/10] nvme-tcp: request secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 08/10] nvme-fabrics: reset admin connection for secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 02/10] nvme: add nvme_auth_generate_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- Re: [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Hannes Reinecke <hare@xxxxxxx>
- [PATCH 10/10] nvmet: add tls_concat and tls_key debugfs entries
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 05/10] nvme-keyring: add nvme_tls_psk_refresh()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 1/6] nvme-keyring: add nvme_tls_psk_refresh()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCHv13 00/10] nvme: implement secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 03/10] nvme: add nvme_auth_generate_digest()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 6/9] crypto: qce - make qce_register_algs() a managed interface
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 9/9] crypto: qce - switch to using a mutex
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 8/9] crypto: qce - convert tasklet to workqueue
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 7/9] crypto: qce - use __free() for a buffer that's always freed
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 5/9] crypto: qce - convert qce_dma_request() to use devres
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 4/9] crypto: qce - shrink code with devres clk helpers
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 3/9] crypto: qce - remove unneeded call to icc_set_bw() in error path
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 2/9] crypto: qce - unregister previously registered algos in error path
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 1/9] crypto: qce - fix goto jump in error path
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH 0/9] crypto: qce - refactor the driver
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v6 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: section mismatch error in aesgcm causing a build failure
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] crypto: rsassa-pkcs1 - Copy source data for SG list
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Bug report (maybe fixed, but I'm not sure)
- From: ZachWade <zachwade.k@xxxxxxxxx>
- Bug report (maybe fixed, but I'm not sure)
- From: ZachWade <zachwade.k@xxxxxxxxx>
- RE: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- RE: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- section mismatch error in aesgcm causing a build failure
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Nhat Pham <nphamcs@xxxxxxxxx>
- Re: [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Maurizio Lombardi <mlombard@xxxxxxxxxx>
- [PATCHv12 00/10] nvme: implement secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 10/10] nvmet: add tls_concat and tls_key debugfs entries
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: Drop Bhupesh Sharma from maintainers
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Use scoped guard for mutex
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 09/10] nvmet-tcp: support secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 08/10] nvme-fabrics: reset admin connection for secure concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 05/10] nvme-keyring: add nvme_tls_psk_refresh()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 04/10] nvme: add nvme_auth_derive_tls_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 07/10] nvme-tcp: request secure channel concatenation
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 06/10] nvme: always include <linux/key.h>
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 03/10] nvme: add nvme_auth_generate_digest()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- [PATCH 02/10] nvme: add nvme_auth_generate_psk()
- From: Hannes Reinecke <hare@xxxxxxxxxx>
- Re: [PATCH v2 10/12] lib/crc32test: delete obsolete crc32test.c
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v2 12/12] MAINTAINERS: add entry for CRC library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 11/12] powerpc/crc: delete obsolete crc-vpmsum_test.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 10/12] lib/crc32test: delete obsolete crc32test.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 09/12] lib/crc16_kunit: delete obsolete crc16_kunit.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 08/12] lib/crc_kunit.c: add KUnit test suite for CRC library functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 07/12] powerpc/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 06/12] arm64/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 05/12] arm/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 04/12] x86/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 03/12] crypto: crct10dif - expose arch-optimized lib function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 02/12] lib/crc-t10dif: add support for arch overrides
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 01/12] lib/crc-t10dif: stop wrapping the crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2 00/12] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 19/19] scsi: target: iscsi: switch to using the crc32c library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 18/19] f2fs: switch to using the crc32 library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 17/19] jbd2: switch to using the crc32c library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 16/19] ext4: switch to using the crc32c library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 15/19] lib/crc32: make crc32c() go directly to lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 14/19] bcachefs: Explicitly select CRYPTO from BCACHEFS_FS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 13/19] x86/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 12/19] x86/crc32: update prototype for crc32_pclmul_le_16()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 11/19] x86/crc32: update prototype for crc_pcl()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 09/19] s390/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 10/19] sparc/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 08/19] powerpc/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 07/19] mips/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 06/19] loongarch/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 05/19] arm/crc32: expose CRC32 functions through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/19] crypto: crc32 - don't unnecessarily register arch algorithms
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 03/19] lib/crc32: expose whether the lib is really optimized at runtime
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 02/19] lib/crc32: improve support for arch-specific overrides
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/19] lib/crc32: drop leading underscores from __crc32c_le_base
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 00/19] Wire up CRC32 library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Move rhashtable over to linux-crypto
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v2] crypto: ccp: Use scoped guard for mutex
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH] dt-bindings: Drop Bhupesh Sharma from maintainers
- From: Konrad Dybcio <konradybcio@xxxxxxxxxx>
- [PATCH] dt-bindings: Drop Bhupesh Sharma from maintainers
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH] crypto: rsassa-pkcs1 - Copy source data for SG list
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH 2/6] scripts/crc: add gen-crc-consts.py
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/6] x86: new optimized CRC functions, with VPCLMULQDQ support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/6] scripts/crc: add gen-crc-consts.py
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/6] x86: new optimized CRC functions, with VPCLMULQDQ support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/6] scripts/crc: add gen-crc-consts.py
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/2] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v6 2/2] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v6 1/2] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] crypto: rsassa-pkcs1 - Copy source data for SG list
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] crypto: sig - Set maskset to CRYPTO_ALG_TYPE_MASK
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: chenridong <chenridong@xxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH crypto-2.6] crypto: rsassa-pkcs1 - Avoid pointing to rodata in scatterlists
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] MAINTAINERS: Move rhashtable over to linux-crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hwrng: cctrng: Add cancel_work_sync before module remove
- From: Pei Xiao <xiaopei01@xxxxxxxxxx>
- Re: [PATCH] x86/aesni: fix uninit value for skcipher_walk
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] x86/aesni: fix uninit value for skcipher_walk
- From: Ragavendra <ragavendra.bn@xxxxxxxxx>
- Re: [PATCH 1/2] [RFC] hwrng: fix khwrng lifecycle
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v2] crypto: caam - use JobR's space to access page 0 regs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH V4 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 03/10] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] crypto: caam - use JobR's space to access page 0 regs
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] crypto: caam - use JobR's space to access page 0 regs
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- RE: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH V4 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- Re: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH 1/6] x86: move zmm exclusion list into CPU feature flag
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- RE: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH 1/6] x86: move zmm exclusion list into CPU feature flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [bug] pkcs1(rsa-generic,sha256) sign test and RSA selftest failures, possibly related to sig_alg backend changes
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH V5 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [bug] pkcs1(rsa-generic,sha256) sign test and RSA selftest failures, possibly related to sig_alg backend changes
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v5 3/3] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] padata: add pd get/put refcnt helper
- From: kernel test robot <lkp@xxxxxxxxx>
- [syzbot] [crypto?] KMSAN: uninit-value in sw842_decompress
- From: syzbot <syzbot+e774233ff687aada969e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH V2 1/2] dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V2 0/2] Add QCrypto support for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V2 2/2] arm64: dts: qcom: qcs8300: add QCrypto nodes
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86: move zmm exclusion list into CPU feature flag
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH V3 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V3 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V3 0/2] Enable Inline crypto engine for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V5 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V5 1/2] dt-bindings: crypto: qcom,prng: document QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V5 0/2] Enable TRNG for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [PATCH v5 3/3] s390/crypto: New s390 specific protected key hash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 6/6] x86/crc32: implement crc32_be using new template
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/6] x86/crc-t10dif: implement crc_t10dif using new template
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/6] x86/crc32: implement crc32_le using new template
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/6] x86/crc: add "template" for [V]PCLMULQDQ based CRC functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/6] scripts/crc: add gen-crc-consts.py
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/6] x86: move zmm exclusion list into CPU feature flag
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/6] x86: new optimized CRC functions, with VPCLMULQDQ support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH for-next/fixes] arm64/mm: Fix false-positive !virt_addr_valid() for kernel image
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH AUTOSEL 6.11 1/6] crypto: ecdsa - Avoid signed integer overflow on signature decoding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.12 1/6] crypto: ecdsa - Avoid signed integer overflow on signature decoding
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V4 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 2/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH 0/2] padata: fix UAF in padata_reorder
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH 1/2] padata: add pd get/put refcnt helper
- From: Chen Ridong <chenridong@xxxxxxxxxxxxxxx>
- [PATCH v4 10/10] mm: zswap: Compress batching with Intel IAA in zswap_batch_store() of large folios.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 08/10] crypto: iaa - Distribute compress jobs from all cores to all IAAs on a package.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 07/10] crypto: iaa - Map IAA devices/wqs to cores based on packages instead of NUMA.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 06/10] crypto: iaa - Re-organize the iaa_crypto driver code.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 05/10] crypto: iaa - Disable iaa_verify_compress by default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 04/10] crypto: iaa - Make async mode the default.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 03/10] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 02/10] crypto: iaa - Add an acomp_req flag CRYPTO_ACOMP_REQ_POLL to enable async mode.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 00/10] zswap IAA compress batching
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- [PATCH v4 01/10] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: Kanchana P Sridhar <kanchana.p.sridhar@xxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Zorro Lang <zlang@xxxxxxxxxx>
- Re: [PATCH V4 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH V2 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v5 2/3] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v5 0/3] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v5 3/3] s390/crypto: New s390 specific protected key hash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v5 1/3] crypto: api - Adjust HASH_MAX_DESCSIZE for s390-phmac context
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- [PATCH V2 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V2 0/2] Enable Inline crypto engine for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V2 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH V4 0/2] Enable TRNG for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH V4 1/2] dt-bindings: crypto: qcom,prng: document QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V4 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [Bug report] kernel BUG at include/linux/scatterlist.h
- From: Zorro Lang <zlang@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- sporadic CAAM Invalid Sequence Command errors on aes-128-cbc encrypt & decrypt
- From: Roland Ruckerbauer <mail@xxxxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam - use JobR's space to access page 0 regs
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [EXT] Re: [PATCH] crypto: caam - use JobR's space to access page 0 regs
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/11] dmaengine: qcom: bam_dma: add cmd descriptor support
- From: Md Sadre Alam <quic_mdalam@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [GIT PULL] Crypto Update for 6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Zhihang Shao <zhihang.shao.iscas@xxxxxxxxx>
- Re: [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: CCP issue related to GPU pass-through?
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: CCP issue related to GPU pass-through?
- From: Jacobo Pantoja <jacobopantoja@xxxxxxxxx>
- linux-next: duplicate patch in the crypto-current tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: tegra - do not transfer req when tegra init fails
- From: chenridong <chenridong@xxxxxxxxxx>
- RE: [EXT] Re: [PATCH] crypto: caam - use JobR's space to access page 0 regs
- From: Gaurav Jain <gaurav.jain@xxxxxxx>
- Re: [PATCH v2 02/19] crypto: sig - Introduce sig_alg backend
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] Crypto Update for 6.13
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- WireGuard & Linux kernel RNG @ FOSDEM 2025
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: CCP issue related to GPU pass-through?
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- CCP issue related to GPU pass-through?
- From: Jacobo Pantoja <jacobopantoja@xxxxxxxxx>
- [PATCH 11/11] MAINTAINERS: add entry for CRC library
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 10/11] powerpc/crc: delete obsolete crc-vpmsum_test.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 09/11] lib/crc32test: delete obsolete crc32test.c
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 08/11] lib/crc_kunit.c: add KUnit test suite for CRC library functions
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 07/11] powerpc/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 06/11] arm64/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 05/11] arm/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 04/11] x86/crc-t10dif: expose CRC-T10DIF function through lib
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 03/11] crypto: crct10dif - expose arch-optimized lib function
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 02/11] lib/crc-t10dif: add support for arch overrides
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 01/11] lib/crc-t10dif: stop wrapping the crypto API
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 00/11] Wire up CRC-T10DIF library functions to arch-optimized code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 3/3] s390/crypto: New s390 specific shash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 01/13] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: "Sridhar, Kanchana P" <kanchana.p.sridhar@xxxxxxxxx>
- Re: [GIT PULL] Crypto Fixes for 6.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/2] dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- [PATCH v4 1/3] crypto: api - Adjust HASH_MAX_DESCSIZE for s390-phmac context
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v4 3/3] s390/crypto: New s390 specific shash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v4 0/3] New s390 specific protected key hmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH v4 2/3] s390/crypto: Add protected key hmac subfunctions for KMAC
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH] crypto: marvell/cesa: fix uninit value for struct mv_cesa_op_ctx
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] aes-gcm-p10: Use the correct bit to test for P10
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] hwrng: amd - remove reference to removed PPC_MAPLE config
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Clean up and improve ARM/arm64 CRC-T10DIF code
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: bcm - add error check in the ahash_hmac_init function
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: caam - add error check to caam_rsa_set_priv_key_form
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Crypto Fixes for 6.12
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 11/22] crypto: amlogic - Introduce hasher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/13] crypto: acomp - Define two new interfaces for compress/decompress batching.
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: hisilicon/zip - support new error report
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 1/2] crypto: hisilicon/zip - add data aggregation feature
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH 0/2] crypto: hisilicon - add data aggregation feature
- From: Weili Qian <qianweili@xxxxxxxxxx>
- [PATCH v4 0/2] crypto: hisilicon - fix the authsize and icv problems of aead in sec
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v4 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- [PATCH v4 1/2] crypto: hisilicon/sec2 - fix for aead icv error
- From: Chenghai Huang <huangchenghai2@xxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] crypto: api - Call crypto_schedule_test outside of mutex
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: api - Fix boot-up self-test race
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: Unify "fsl,liodn" type definitions
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH V3 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: dts: qcom: qcs8300: add QCrypto nodes
- From: Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxxxx>
- [PATCH v2] riscv: Optimize crct10dif with zbc extension
- From: Zhihang Shao <zhihang.shao.iscas@xxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: "linwenkai (C)" <linwenkai6@xxxxxxxxxxxxx>
- Re: [syzbot] Monthly crypto report (Nov 2024)
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] s390/crypto: New s390 specific shash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] riscv: Optimize crct10dif with zbc extension
- From: Chunyan Zhang <zhangchunyan@xxxxxxxxxxx>
- [PATCH] dt-bindings: Unify "fsl,liodn" type definitions
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v6 4/8] crypto: ccp: Fix uapi definitions of PSP errors
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: caam - use JobR's space to access page 0 regs
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v6 5/8] crypto: ccp: Add GCTX API to track ASID assignment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] Monthly crypto report (Nov 2024)
- From: syzbot <syzbot+listbb9cdfe92636134be785@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Clean up and improve ARM/arm64 CRC-T10DIF code
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/2] lib/crct10diftest.c add selftests for crct10dif
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] crypto: caam - add error check to caam_rsa_set_priv_key_form
- From: Horia Geanta <horia.geanta@xxxxxxx>
- [PATCH 2/2] riscv: Optimize crct10dif with zbc extension
- From: Zhihang Shao <zhihang.shao.iscas@xxxxxxxxx>
- [PATCH 1/2] lib/crct10diftest.c add selftests for crct10dif
- From: Zhihang Shao <zhihang.shao.iscas@xxxxxxxxx>
- [PATCH 0/2] RISC-V CRC-T10DIF optimization with zbc extension and CRC-T10DIF selftest
- From: Zhihang Shao <zhihang.shao.iscas@xxxxxxxxx>
- Re: [REGRESSION] alg: ahash: Several tests fail during boot on Turris Omnia
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- [PATCH 2/2] arm64: dts: qcom: qcs8300: add QCrypto nodes
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 0/2] Add QCrypto support for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 0/2] Enable Inline crypto engine for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 2/2] arm64: dts: qcom: qcs8300: enable the inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH 1/2] dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V3 1/2] dt-bindings: crypto: qcom,prng: document QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V3 2/2] arm64: dts: qcom: qcs8300: add TRNG node
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH V3 0/2] Enable TRNG for QCS8300
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- [PATCH v6 4/8] crypto: ccp: Fix uapi definitions of PSP errors
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v6 6/8] crypto: ccp: Add DOWNLOAD_FIRMWARE_EX support
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v6 5/8] crypto: ccp: Add GCTX API to track ASID assignment
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v5 07/10] crypto: ccp: Add preferred access checking method
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 08/10] KVM: SVM: move sev_issue_cmd_external_user to new API
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 07/10] crypto: ccp: Add preferred access checking method
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [REGRESSION] alg: ahash: Several tests fail during boot on Turris Omnia
- From: Klaus Kudielka <klaus.kudielka@xxxxxxxxx>
- Re: [PATCH v5 08/10] KVM: SVM: move sev_issue_cmd_external_user to new API
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v5 08/10] KVM: SVM: move sev_issue_cmd_external_user to new API
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 3/3] s390/crypto: New s390 specific shash phmac
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] crypto: hisilicon/sec2 - fix for aead invalid authsize
- From: "linwenkai (C)" <linwenkai6@xxxxxxxxxxxxx>
- [PATCH v7 0/3] crypto: Add EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v7 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v7 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- [PATCH v7 1/3] spinlock: extend guard with spinlock_bh variants
- From: Christian Marangi <ansuelsmth@xxxxxxxxx>
- Re: [PATCH v3 3/3] s390/crypto: New s390 specific shash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] s390/crypto: New s390 specific shash phmac
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/10] crypto: ccp: Add preferred access checking method
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 06/10] crypto: ccp: Add DOWNLOAD_FIRMWARE_EX support
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v10 17/22] dt-bindings: crypto: amlogic,gxl-crypto: support new SoC's
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v5 06/10] crypto: ccp: Add DOWNLOAD_FIRMWARE_EX support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v10 16/22] dt-bindings: crypto: amlogic,gxl-crypto: correct clk and interrupt lines
- From: "Rob Herring (Arm)" <robh@xxxxxxxxxx>
- Re: [PATCH v5 05/10] crypto: ccp: Add GCTX API to track ASID assignment
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v5 05/10] crypto: ccp: Add GCTX API to track ASID assignment
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v5 05/10] crypto: ccp: Add GCTX API to track ASID assignment
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v5 05/10] crypto: ccp: Add GCTX API to track ASID assignment
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: ccp: Use scoped guard for mutex
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] crypto: caam - use JobR's space to access page 0 regs
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] s390/crypto: New s390 specific shash phmac
- From: Ingo Franzki <ifranzki@xxxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Netfilter]
[Bugtraq]
[GNU Crypto]