linux-crypto
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH] crypto: jitterentropy: Put constants on the right side of the expression
Herbert Xu
[PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Stefan Berger
[PATCH v12 07/10] x509: Add support for parsing x509 certs with ECDSA keys
Stefan Berger
[PATCH v12 01/10] oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
Stefan Berger
[PATCH v12 06/10] x509: Detect sm2 keys by their parameters OID
Stefan Berger
[PATCH v12 04/10] crypto: Add math to support fast NIST P384
Stefan Berger
[PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Stefan Berger
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Stefan Berger
Re: [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
[PATCH v12 05/10] ecdsa: Register NIST P384 and extend test suite
Stefan Berger
[PATCH v12 03/10] crypto: Add NIST P384 curve parameters
Stefan Berger
[PATCH v12 09/10] x509: Add OID for NIST P384 and extend parser for it
Stefan Berger
[PATCH v12 08/10] ima: Support EC keys for signature verification
Stefan Berger
[PATCH v12 10/10] certs: Add support for using elliptic curve keys for signing modules
Stefan Berger
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Stefan Berger
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
Herbert Xu
[PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
[PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Horia Geantă
Re: [PATCH v1 1/3] crypto: caam - add in-kernel interface for blob generator
Ahmad Fatoum
[PATCH v1 2/3] KEYS: trusted: implement fallback to kernel RNG
Ahmad Fatoum
[PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Horia Geantă
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Mimi Zohar
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
David Gstir
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Herbert Xu
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Eric Biggers
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Jarkko Sakkinen
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Mimi Zohar
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Serge E. Hallyn
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
James Bottomley
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Richard Weinberger
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
David Howells
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Horia Geantă
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Sumit Garg
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
Ahmad Fatoum
[PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Jay Fang
Re: [PATCH] hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Herbert Xu
[syzbot] general protection fault in scatterwalk_copychunks (4)
syzbot
stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Thomas Backlund
Re: stable request
Ard Biesheuvel
Re: stable request
Sasha Levin
Re: stable request
Ard Biesheuvel
Re: stable request
Sasha Levin
Re: stable request
Ard Biesheuvel
Re: stable request
Ard Biesheuvel
Re: stable request
Thomas Backlund
Re: stable request
Greg KH
Re: stable request
Sasha Levin
[PATCH v2 0/4] Fix the parameter of dma_map_sg()
chenxiang
[PATCH v2 3/4] crypto: ux500 - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 4/4] crypto: allwinner - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 1/4] crypto: amlogic - Fix the parameter of dma_unmap_sg()
chenxiang
[PATCH v2 2/4] crypto: cavium - Fix the parameter of dma_unmap_sg()
chenxiang
Re: [PATCH v2 0/4] Fix the parameter of dma_map_sg()
Herbert Xu
From Mrs.Glenn
Mrs.Glenn
[PATCH v3 0/2] PSP TEE driver update and bug fixes
Rijo Thomas
[PATCH v3 1/2] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
Rijo Thomas
[PATCH v3 2/2] crypto: ccp - fix command queuing to TEE ring buffer
Rijo Thomas
Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
Herbert Xu
Re: [PATCH v3 0/2] PSP TEE driver update and bug fixes
Rijo Thomas
[PATCH] hwrng: intel - Fix included header from 'asm
Tian Tao
Re: [PATCH] hwrng: intel - Fix included header from 'asm
Herbert Xu
[PATCH] char: hw_random: delete redundant printing of return value
Wang Qing
Re: [PATCH] char: hw_random: delete redundant printing of return value
Herbert Xu
[PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
Longfang Liu
[PATCH v4 1/3] crypto: hisilicon/sec - fixes a printing error
Longfang Liu
[PATCH v4 3/3] crypto: hisilicon/sec - fixes some driver coding style
Longfang Liu
[PATCH v4 2/3] crypto: hisilicon/sec - fixes some coding style
Longfang Liu
Re: [PATCH v4 0/3] crypto:hisilicon/sec - fixes some coding style
Herbert Xu
[PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
Tian Tao
Re: [PATCH] hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
Herbert Xu
[PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
Tian Tao
Re: [PATCH] hwrng: cctrn - use devm_platform_ioremap_resource() to simplify
Herbert Xu
[PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
[PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
Re: [PATCH v7 1/5] tools/certs: Add print-cert-tbs-hash.sh
Eric Snowberg
[PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
[PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Eric Snowberg
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Eric Snowberg
Re: [PATCH v7 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
[PATCH v7 4/5] certs: Factor out the blacklist hash creation
Mickaël Salaün
Re: [PATCH v7 4/5] certs: Factor out the blacklist hash creation
Jarkko Sakkinen
[PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
Re: [PATCH v7 2/5] certs: Check that builtin blacklist hashes are valid
Jarkko Sakkinen
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
Mickaël Salaün
[PATCH v3 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Tong Zhang
Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Giovanni Cabiddu
Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Giovanni Cabiddu
[PATCH v4 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH v4 1/2] crypto: qat - don't release uninitialized resources
Tong Zhang
[PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Giovanni Cabiddu
[PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
Tong Zhang
[PATCH v5 1/2] crypto: qat - don't release uninitialized resources
Tong Zhang
[PATCH v5 2/2] crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v5 0/2] crypto: qat - fix couple crashes duing error handling
Herbert Xu
Re: [PATCH v4 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v3 1/2] crypto: qat - dont release uninitialized resources
Tong Zhang
[PATCH v3 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v3 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Giovanni Cabiddu
[PATCH v2 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH v2 1/2] crypto: qat - dont release uninitialized resources
Tong Zhang
[PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Andy Shevchenko
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Andy Shevchenko
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Andy Shevchenko
Re: [PATCH v2 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
[PATCH 0/2] crypto: qat: fix couple crashes duing error handling
Tong Zhang
[PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
Re: [PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Andy Shevchenko
Re: [PATCH 2/2] crypto: qat: ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Tong Zhang
[PATCH 1/2] crypto: qat - dont release uninitialized resources
Tong Zhang
Re: [PATCH 0/2] crypto: qat: fix couple crashes duing error handling
Andy Shevchenko
Caleb Leo Foundation,
JOHN UMAH
[PATCH v3 0/2] crypto: arm - clean up redundant helper macros
Ard Biesheuvel
[PATCH v3 2/2] crypto: arm/chacha-scalar - switch to common rev_l macro
Ard Biesheuvel
[PATCH v3 1/2] crypto: arm/aes-scalar - switch to common rev_l/mov_l macros
Ard Biesheuvel
Re: [PATCH v3 0/2] crypto: arm - clean up redundant helper macros
Herbert Xu
[PATCH] crypto: arm/blake2s - fix for big endian
Eric Biggers
Re: [PATCH] crypto: arm/blake2s - fix for big endian
Ard Biesheuvel
Re: [PATCH] crypto: arm/blake2s - fix for big endian
Herbert Xu
[PATCH 0/8] Enable Qualcomm Crypto Engine on sm8250
Bhupesh Sharma
[PATCH 3/8] arm64/dts: qcom: sdm845: Use RPMH_CE_CLK macro directly
Bhupesh Sharma
[PATCH 1/8] dt-bindings: qcom-qce: Add 'iommus' to required properties
Bhupesh Sharma
[PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
Bhupesh Sharma
Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
Rob Herring
Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
Bhupesh Sharma
Re: [PATCH 2/8] dt-bindings: crypto : Add new compatible strings for qcom-qce
Thara Gopinath
[PATCH 4/8] dt-bindings/clock: qcom: sm8250: Add gcc clocks for sm8250 crypto block
Bhupesh Sharma
Re: [PATCH 4/8] dt-bindings/clock: qcom: sm8250: Add gcc clocks for sm8250 crypto block
Bhupesh Sharma
[PATCH 5/8] clk: qcom: clk-rpmh: Add CE clock on sm8250
Bhupesh Sharma
[PATCH 7/8] drivers: crypto: qce: Enable support for crypto engine on sm8250.
Bhupesh Sharma
[PATCH 6/8] clk: qcom: Add gcc clocks for crypto block on sm8250
Bhupesh Sharma
[PATCH 8/8] arm64/dts: qcom: sm8250: Add dt entries to support crypto engine.
Bhupesh Sharma
[PATCH v2 0/2] PSP TEE driver update and bug fixes
Rijo Thomas
[PATCH v2 2/2] crypto: ccp - fix command queuing to TEE ring buffer
Rijo Thomas
[PATCH v2 1/2] crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
Rijo Thomas
Earlier messages
Later messages