linux-crypto
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH RFC v2 0/5] Asymmetric TPM2 key type
Jarkko Sakkinen
[PATCH RFC 0/5] Asymmetric TPM2 key type
Jarkko Sakkinen
[PATCH RFC 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
Jarkko Sakkinen
[PATCH RFC 2/5] tpm: export tpm2_load_context()
Jarkko Sakkinen
[PATCH RFC 3/5] KEYS: trusted: Do not use WARN when encode fails
Jarkko Sakkinen
[PATCH RFC 4/5] KEYS: trusted: Migrate tpm2_key_{encode,decode}() to TPM driver
Jarkko Sakkinen
[PATCH RFC 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
Jarkko Sakkinen
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Ard Biesheuvel
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Jarkko Sakkinen
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
James Bottomley
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Ard Biesheuvel
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
James Bottomley
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Nícolas F . R . A . Prado
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Jarkko Sakkinen
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Eric Biggers
[PATCH] crypto: api - Do not load modules until algapi is ready
Herbert Xu
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
Jarkko Sakkinen
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
Herbert Xu
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
Jarkko Sakkinen
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
James Bottomley
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
Herbert Xu
Re: [PATCH] crypto: api - Do not load modules until algapi is ready
Nícolas F . R . A . Prado
[v2 PATCH] crypto: api - Do not load modules if called by async probing
Herbert Xu
Re: [v2 PATCH] crypto: api - Do not load modules if called by async probing
Nícolas F . R . A . Prado
[v3 PATCH] hwrng: core - Remove add_early_randomness
Herbert Xu
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Jarkko Sakkinen
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Herbert Xu
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Nícolas F . R . A . Prado
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Linus Torvalds
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Herbert Xu
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Jarkko Sakkinen
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Herbert Xu
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Jarkko Sakkinen
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Jarkko Sakkinen
Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
Torsten Duwe
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Jarkko Sakkinen
Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
Herbert Xu
[PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
Jarkko Sakkinen
Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
Herbert Xu
Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
Jarkko Sakkinen
[PATCH] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
Jarkko Sakkinen
[linus:master] [crypto] 203a6763ab: Kernel_panic-not_syncing:Certs_selftest#:pkcs7_verify()=
kernel test robot
Re: [linus:master] [crypto] 203a6763ab: Kernel_panic-not_syncing:Certs_selftest#:pkcs7_verify()=
Eric Biggers
[PATCH v8 0/6] DCP as trusted keys backend
David Gstir
[PATCH v8 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
David Gstir
[PATCH v8 2/6] KEYS: trusted: improve scalability of trust source config
David Gstir
[PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
David Gstir
RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
Kshitiz Varshney
Re: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
Ahmad Fatoum
RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
Kshitiz Varshney
[PATCH v8 4/6] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
[PATCH v8 5/6] docs: document DCP-backed trusted keys kernel params
David Gstir
[PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Bagas Sanjaya
Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
RE: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Kshitiz Varshney
Re: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
RE: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Kshitiz Varshney
Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Herbert Xu
Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
[PATCH v7 0/6] DCP as trusted keys backend
David Gstir
[PATCH v7 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
David Gstir
[PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
David Gstir
Re: [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
Jarkko Sakkinen
[PATCH v7 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
David Gstir
[PATCH v7 4/6] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
[PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
David Gstir
Re: [PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
Jarkko Sakkinen
[PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
Jarkko Sakkinen
[PATCH][next] crypto/nx: Avoid potential -Wflex-array-member-not-at-end warning
Gustavo A. R. Silva
Re: [PATCH][next] crypto/nx: Avoid potential -Wflex-array-member-not-at-end warning
Kees Cook
[PATCH][next] crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
Gustavo A. R. Silva
Re: [PATCH][next] crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
Cabiddu, Giovanni
Re: [PATCH][next] crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
Herbert Xu
[PATCH 0/2] Add Inline Crypto Engine for SC7280 UFS
Luca Weiss
[PATCH 1/2] dt-bindings: crypto: ice: Document sc7280 inline crypto engine
Luca Weiss
Re: [PATCH 1/2] dt-bindings: crypto: ice: Document sc7280 inline crypto engine
Krzysztof Kozlowski
Re: [PATCH 1/2] dt-bindings: crypto: ice: Document sc7280 inline crypto engine
Herbert Xu
[PATCH 2/2] arm64: dts: qcom: sc7280: Add inline crypto engine
Luca Weiss
Re: [PATCH 2/2] arm64: dts: qcom: sc7280: Add inline crypto engine
Konrad Dybcio
Re: (subset) [PATCH 0/2] Add Inline Crypto Engine for SC7280 UFS
Bjorn Andersson
[PATCH RFC 0/8] Clavis LSM
Eric Snowberg
[PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
Eric Snowberg
[PATCH RFC 1/8] certs: Introduce ability to link to a system key
Eric Snowberg
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Jarkko Sakkinen
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Eric Snowberg
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Jarkko Sakkinen
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Eric Snowberg
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Jarkko Sakkinen
RE: [EXTERNAL] [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Bharat Bhushan
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Mimi Zohar
Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
Eric Snowberg
[PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
Eric Snowberg
[PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
Eric Snowberg
[PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
Eric Snowberg
[PATCH RFC 6/8] keys: Add ability to track intended usage of the public key
Eric Snowberg
[PATCH RFC 7/8] clavis: Introduce a new key type called clavis_key_acl
Eric Snowberg
[PATCH RFC 8/8] clavis: Introduce new LSM called clavis
Eric Snowberg
Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
Randy Dunlap
Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
Eric Snowberg
[PATCH][next] crypto/nx: Avoid -Wflex-array-member-not-at-end warning
Gustavo A. R. Silva
Re: [PATCH][next] crypto/nx: Avoid -Wflex-array-member-not-at-end warning
Herbert Xu
Re: virtcrypto_dataq_callback calls crypto_finalize_request() from irq context
Michael S. Tsirkin
[PATCH v2] arm64: dts: qcom: sm6350: Add Crypto Engine
Luca Weiss
Re: [PATCH v2] arm64: dts: qcom: sm6350: Add Crypto Engine
Bjorn Andersson
[PATCH v2 0/6] ubsan: Introduce wrap-around sanitizers
Kees Cook
[PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
Kees Cook
Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
Marco Elver
Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
Kees Cook
Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
Marco Elver
Re: [PATCH v2 2/6] ubsan: Reintroduce signed and unsigned overflow sanitizers
Miguel Ojeda
[PATCH v2 1/6] ubsan: Use Clang's -fsanitize-trap=undefined option
Kees Cook
[PATCH v2 3/6] ubsan: Introduce CONFIG_UBSAN_POINTER_WRAP
Kees Cook
[PATCH v2 4/6] ubsan: Remove CONFIG_UBSAN_SANITIZE_ALL
Kees Cook
[PATCH v2 5/6] ubsan: Split wrapping sanitizer Makefile rules
Kees Cook
[PATCH v2 6/6] ubsan: Get x86_64 booting with unsigned wrap-around sanitizer
Kees Cook
[PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
zhenwei pi
Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
Nathan Chancellor
Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
Michael S. Tsirkin
Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
Jason Wang
Re: [PATCH] crypto: virtio/akcipher - Fix stack overflow on memcpy
Herbert Xu
[PATCH] crypto: qat - use kcalloc() instead of kzalloc()
Lenko Donchev
Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
Gustavo A. R. Silva
Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
Cabiddu, Giovanni
Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
Nathan Chancellor
Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
Guenter Roeck
Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
Nathan Chancellor
Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
Michael S. Tsirkin
Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
Michael S. Tsirkin
Re: Re: [PATCH 5.10 000/286] 5.10.209-rc1 review
zhenwei pi
[PATCH] virtio_crypto: remove duplicate check if queue is broken
Li RongQing
Re: [PATCH] virtio_crypto: remove duplicate check if queue is broken
Stefan Hajnoczi
[PATCH 46/82] crypto: Refactor intentional wrap-around test
Kees Cook
Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
Eric Biggers
Re: [PATCH 46/82] crypto: Refactor intentional wrap-around test
Kees Cook
[PATCH 39/82] crypto: Refactor intentional wrap-around test
Kees Cook
[PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
Erick Archer
Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
Gustavo A. R. Silva
Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
Cabiddu, Giovanni
Re: [PATCH] crypto: qat - use kcalloc_node() instead of kzalloc_node()
Herbert Xu
[PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
Erick Archer
Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
Gustavo A. R. Silva
Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
Jernej Škrabec
Re: [PATCH] crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
Herbert Xu
[PATCH 0/2] Add Crypto Engine support for SM6350
Luca Weiss
[PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
Luca Weiss
Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
Krzysztof Kozlowski
Re: [PATCH 1/2] dt-bindings: qcom-qce: Add compatible for SM6350
Herbert Xu
[PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Luca Weiss
Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Stephan Gerhold
Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Luca Weiss
Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Stephan Gerhold
Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Bjorn Andersson
Re: [PATCH 2/2] arm64: dts: qcom: sm6350: Add Crypto Engine
Luca Weiss
Re: [PATCH 0/2] Add Crypto Engine support for SM6350
Konrad Dybcio
Re: [PATCH 0/2] Add Crypto Engine support for SM6350
Luca Weiss
Re: [PATCH 0/2] Add Crypto Engine support for SM6350
Konrad Dybcio
[PATCH v3 0/8] Add UFS support for SC7180/SM7125
David Wronek
[PATCH v3 1/8] dt-bindings: crypto: ice: Document SC7180 inline crypto engine
David Wronek
[PATCH v3 2/8] dt-bindings: ufs: qcom: Add SC7180 compatible string
David Wronek
[PATCH v3 3/8] dt-bindings: phy: Add QMP UFS PHY compatible for SC7180
David Wronek
[PATCH v3 4/8] dt-bindings: arm: qcom: Add Xiaomi Redmi Note 9S
David Wronek
[PATCH v3 5/8] phy: qcom: qmp-ufs: Add SC7180 support
David Wronek
Re: [PATCH v3 5/8] phy: qcom: qmp-ufs: Add SC7180 support
Dmitry Baryshkov
[PATCH v3 6/8] arm64: dts: qcom: sc7180: Add UFS nodes
David Wronek
[PATCH v3 7/8] arm64: dts: qcom: sm7125-xiaomi-common: Add UFS nodes
David Wronek
[PATCH v3 8/8] arm64: dts: qcom: Add support for Xiaomi Redmi Note 9S
David Wronek
[PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Markus Elfring
Re: [PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
kernel test robot
[PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Markus Elfring
RE: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Gonglei (Arei)
Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Justin Stitt
Re: crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Markus Elfring
Re: [PATCH v2] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Herbert Xu
Re: [PATCH] crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
kernel test robot
[PATCH v5 0/6] DCP as trusted keys backend
David Gstir
[PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
David Gstir
Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
Jarkko Sakkinen
Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
Jarkko Sakkinen
[PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
David Gstir
Re: [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
Jarkko Sakkinen
[PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
Jarkko Sakkinen
Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
[PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
David Gstir
Re: [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
Jarkko Sakkinen
[PATCH v5 5/6] docs: document DCP-backed trusted keys kernel params
David Gstir
[PATCH v5 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
Re: [PATCH v5 0/6] DCP as trusted keys backend
Paul Moore
Re: [PATCH v5 0/6] DCP as trusted keys backend
Jarkko Sakkinen
Re: [PATCH v5 0/6] DCP as trusted keys backend
David Gstir
Re: [PATCH v5 0/6] DCP as trusted keys backend
Richard Weinberger
Re: [PATCH v5 0/6] DCP as trusted keys backend
Richard Weinberger
Earlier messages
Later messages