linux-crypto
Thread
Date
Earlier messages
Later messages
Messages by Thread
[PATCH] crypto: hisilicon - fix the check on dma address
Hui Tang
Re: [PATCH] crypto: hisilicon - fix the check on dma address
Herbert Xu
[PATCH 0/2] crypto: hisilicon/hpre - remove 'CONFIG_CRYPTO_DH'
Hui Tang
[PATCH 1/2] crypto: hisilicon/hpre - delete wrap of 'CONFIG_CRYPTO_DH'
Hui Tang
[PATCH 2/2] crypto: hisilicon/hpre - optimise 'hpre_algs_register' error path
Hui Tang
Re: [PATCH 0/2] crypto: hisilicon/hpre - remove 'CONFIG_CRYPTO_DH'
Herbert Xu
Re: [PATCH for-stable-5.4] crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
Greg KH
[PATCH] crypto: Correct an error in the comments
Meng Yu
Re: [PATCH] crypto: Correct an error in the comments
Herbert Xu
[PATCH] md/raid6: Couple of typo fixes
Bhaskar Chowdhury
Re: [PATCH] md/raid6: Couple of typo fixes
Randy Dunlap
[PATCH 0/4]crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
Yang Shen
[PATCH 2/4] crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
Yang Shen
[PATCH 1/4] crypto: hisilicon/zip - adjust functions location
Yang Shen
[PATCH 3/4] crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
Yang Shen
[PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
Yang Shen
Re: [PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
Herbert Xu
Re: [PATCH 4/4] crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
shenyang (M)
[RFC 0/1] crypto: dcp - add power management support
Dragos Rosioru (OSS)
[RFC 1/1] crypto: dcp - add power management support
Dragos Rosioru (OSS)
Re: [RFC 1/1] crypto: dcp - add power management support
Herbert Xu
[PATCH v3 00/10] Rid W=1 warnings in Crypto
Lee Jones
[PATCH 01/10] crypto: hisilicon: sec_drv: Supply missing description for 'sec_queue_empty()'s 'queue' param
Lee Jones
[PATCH 02/10] crypto: bcm: Fix a whole host of kernel-doc misdemeanours
Lee Jones
[PATCH 04/10] crypto: ux500: hash: hash_core: Fix worthy kernel-doc headers and remove others
Lee Jones
[PATCH 05/10] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
Lee Jones
Re: [PATCH 05/10] crypto: keembay: ocs-hcu: Fix incorrectly named functions/structs
Alessandrelli, Daniele
[PATCH 03/10] crypto: chelsio: chcr_core: Fix some kernel-doc issues
Lee Jones
[PATCH 06/10] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
Lee Jones
Re: [PATCH 06/10] crypto: atmel-ecc: Struct headers need to start with keyword 'struct'
Tudor.Ambarus
[PATCH 09/10] crypto: nx: nx-aes-cbc: Repair some kernel-doc problems
Lee Jones
[PATCH 08/10] crypto: vmx: Source headers are not good kernel-doc candidates
Lee Jones
[PATCH 07/10] crypto: caam: caampkc: Provide the name of the function and provide missing descriptions
Lee Jones
Re: [PATCH 07/10] crypto: caam: caampkc: Provide the name of the function and provide missing descriptions
Horia Geantă
[PATCH 10/10] crypto: cavium: nitrox_isr: Demote non-compliant kernel-doc headers
Lee Jones
Re: [PATCH v3 00/10] Rid W=1 warnings in Crypto
Herbert Xu
[PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
Bhaskar Chowdhury
Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
Antoine Tenart
Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
Randy Dunlap
Re: [PATCH] crypto: inside-secure: Minor typo fix in the file safexcel.c
Herbert Xu
[PATCH] crypto: jitterentropy: Put constants on the right side of the expression
Milan Djurovic
Re: [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
Stephan Mueller
Re: [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
Herbert Xu
[PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Stefan Berger
[PATCH v12 07/10] x509: Add support for parsing x509 certs with ECDSA keys
Stefan Berger
[PATCH v12 01/10] oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
Stefan Berger
[PATCH v12 06/10] x509: Detect sm2 keys by their parameters OID
Stefan Berger
[PATCH v12 04/10] crypto: Add math to support fast NIST P384
Stefan Berger
[PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Stefan Berger
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Stefan Berger
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
[PATCH v12 05/10] ecdsa: Register NIST P384 and extend test suite
Stefan Berger
[PATCH v12 03/10] crypto: Add NIST P384 curve parameters
Stefan Berger
[PATCH v12 09/10] x509: Add OID for NIST P384 and extend parser for it
Stefan Berger
[PATCH v12 08/10] ima: Support EC keys for signature verification
Stefan Berger
[PATCH v12 10/10] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Stefan Berger
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Herbert Xu
[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
[PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Horia Geantă
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
[PATCH v1 2/3] KEYS: trusted: implement fallback to kernel RNG
Ahmad Fatoum
[PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Horia Geantă
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Mimi Zohar
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
David Gstir
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Herbert Xu
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Mimi Zohar
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Serge E. Hallyn
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
David Howells
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Horia Geantă
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
[PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Jay Fang
Re: [PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Herbert Xu
[syzbot] general protection fault in scatterwalk_copychunks (4)
syzbot
stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Thomas Backlund
Re: stable request
Ard Biesheuvel
Re: stable request
Sasha Levin
Re: stable request
Ard Biesheuvel
Re: stable request
Sasha Levin
Re: stable request
Ard Biesheuvel
Re: stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Greg KH
Re: stable request
Sasha Levin
[PATCH v2 0/4] Fix the parameter of dma_map_sg()
chenxiang
[PATCH v2 3/4] crypto: ux500 - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 4/4] crypto: allwinner - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 1/4] crypto: amlogic - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 2/4] crypto: cavium - Fix the parameter of dma_unmap_sg()
chenxiang
Re: [PATCH v2 0/4] Fix the parameter of dma_map_sg()
Herbert Xu
From Mrs.Glenn
Mrs.Glenn
[PATCH v3 0/2] PSP TEE driver update and bug fixes
Rijo Thomas
[PATCH v3 1/2] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
Rijo Thomas
[PATCH v3 2/2] crypto: ccp - fix command queuing to TEE ring buffer
Rijo Thomas
Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
Herbert Xu
Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
Rijo Thomas
[PATCH] hwrng: intel - Fix included header from 'asm
Tian Tao
Re: [PATCH] hwrng: intel - Fix included header from 'asm
Herbert Xu
[PATCH] char: hw_random: delete redundant printing of return value
Wang Qing
Re: [PATCH] char: hw_random: delete redundant printing of return value
Herbert Xu
[PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
Longfang Liu
[PATCH v4 1/3] crypto: hisilicon/sec - fixes a printing error
Longfang Liu
[PATCH v4 3/3] crypto: hisilicon/sec - fixes some driver coding style
Longfang Liu
[PATCH v4 2/3] crypto: hisilicon/sec - fixes some coding style
Longfang Liu
Re: [PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
Herbert Xu
[PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
Tian Tao
Re: [PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
Herbert Xu
[PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
Tian Tao
Re: [PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
Herbert Xu
[PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
[PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
Re: [PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
Eric Snowberg
[PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
[PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Eric Snowberg
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Eric Snowberg
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
[PATCH v7 4/5] certs: Factor out the blacklist hash creation
Mickaël Salaün
Re: [PATCH v7 4/5] certs: Factor out the blacklist hash creation
Jarkko Sakkinen
[PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
Re: [PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
Jarkko Sakkinen
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
[PATCH v3 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Tong Zhang
Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Giovanni Cabiddu
Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Giovanni Cabiddu
[PATCH v4 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH v4 1/2] crypto: qat - don't release uninitialized resources
Tong Zhang
[PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Giovanni Cabiddu
[PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
Tong Zhang
[PATCH v5 1/2] crypto: qat - don't release uninitialized resources
Tong Zhang
[PATCH v5 2/2] crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
Herbert Xu
Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Earlier messages
Later messages