messages from 2024-12-13 14:08:39 to 2024-12-27 01:33:37 UTC [more...]
[PATCH] crypto: vmac - Handle unaligned input in vmac_update
2024-12-27 1:33 UTC (4+ messages)
[linux-next:master] [x86/crc32] 55d1ecceb8: INFO:task_blocked_for_more_than#seconds
2024-12-27 1:27 UTC (4+ messages)
[PATCH] crypto: vmac - remove unused VMAC algorithm
2024-12-26 19:43 UTC
[PATCH 0/3] ecdsa KEYCTL_PKEY_QUERY fixes
2024-12-26 18:08 UTC (4+ messages)
` [PATCH 1/3] crypto: sig - Prepare for algorithms with variable signature size
` [PATCH 2/3] crypto: ecdsa - Fix enc/dec size reported by KEYCTL_PKEY_QUERY
` [PATCH 3/3] crypto: ecdsa - Fix NIST P521 key "
[PATCH V5 0/2] Enable TRNG for QCS8300
2024-12-26 18:27 UTC (2+ messages)
` (subset) "
[PATCH V3 0/2] Enable Inline crypto engine for QCS8300
2024-12-26 18:27 UTC (2+ messages)
` (subset) "
[PATCH] crypto: vmac - Fix misalignment issue during vmac_update
2024-12-26 16:14 UTC
[PATCH] crypto: vmac: fix misaligned pointer handling in vmac_update
2024-12-26 14:07 UTC (2+ messages)
[PATCH v5 00/12] dmaengine: qcom: bam_dma: add cmd descriptor support
2024-12-26 12:08 UTC (4+ messages)
` [PATCH v5 02/12] dmaengine: add DMA_PREP_LOCK and DMA_PREP_UNLOCK flag
[PATCH v3 0/4] Enable TRNG support
2024-12-26 11:45 UTC (5+ messages)
` [PATCH v3 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
` [PATCH v3 2/4] arm64: dts: qcom: ipq5424: add TRNG node
` [PATCH v3 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
` [PATCH v3 4/4] arm64: dts: qcom: ipq5332: "
[PATCH v2 0/4] Enable TRNG support
2024-12-26 5:08 UTC (9+ messages)
` [PATCH v2 1/4] dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
` [PATCH v2 2/4] arm64: dts: qcom: ipq5424: add TRNG node
` [PATCH v2 3/4] arm64: dts: qcom: ipq9574: update TRNG compatible
` [PATCH v2 4/4] arm64: dts: qcom: ipq5332: "
[REGRESSION][BISECTED] Double energy consumption on idle
2024-12-25 13:48 UTC (4+ messages)
[RFC PATCH v3 00/13] Clavis LSM
2024-12-24 17:43 UTC (14+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 13/13] clavis: Kunit support
[PATCHv13 00/10] nvme: implement secure concatenation
2024-12-24 11:46 UTC (9+ messages)
` [PATCH 06/10] nvme: always include <linux/key.h>
` [PATCH 07/10] nvme-tcp: request secure channel concatenation
` [PATCH 09/10] nvmet-tcp: support "
` [PATCH 10/10] nvmet: add tls_concat and tls_key debugfs entries
[PATCH 00/29] crypto: scatterlist handling improvements
2024-12-23 20:44 UTC (36+ messages)
` [PATCH 01/29] crypto: skcipher - document skcipher_walk_done() and rename some vars
` [PATCH 02/29] crypto: skcipher - remove unnecessary page alignment of bounce buffer
` [PATCH 03/29] crypto: skcipher - remove redundant clamping to page size
` [PATCH 04/29] crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
` [PATCH 05/29] crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
` [PATCH 06/29] crypto: skcipher - clean up initialization of skcipher_walk::flags
` [PATCH 07/29] crypto: skcipher - optimize initializing skcipher_walk fields
` [PATCH 08/29] crypto: skcipher - call cond_resched() directly
` [PATCH 09/29] crypto: omap - switch from scatter_walk to plain offset
` [PATCH 10/29] crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
` [PATCH 11/29] crypto: scatterwalk - move to next sg entry just in time
` [PATCH 12/29] crypto: scatterwalk - add new functions for skipping data
` [PATCH 13/29] crypto: scatterwalk - add new functions for iterating through data
` [PATCH 14/29] crypto: scatterwalk - add new functions for copying data
` [PATCH 15/29] crypto: skcipher - use scatterwalk_start_at_pos()
` [PATCH 16/29] crypto: aegis - use the new scatterwalk functions
` [PATCH 17/29] crypto: arm/ghash "
` [PATCH 18/29] crypto: arm64 "
` [PATCH 19/29] crypto: keywrap "
` [PATCH 20/29] crypto: nx "
` [PATCH 21/29] crypto: s390/aes-gcm "
` [PATCH 22/29] crypto: s5p-sss "
` [PATCH 23/29] crypto: stm32 "
` [PATCH 24/29] crypto: x86/aes-gcm "
` [PATCH 25/29] crypto: x86/aegis "
` [PATCH 26/29] net/tls: "
` [PATCH 27/29] crypto: skcipher - "
` [PATCH 28/29] crypto: scatterwalk - remove obsolete functions
` [PATCH 29/29] crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
[PATCH] crypto: lib/gf128mul - Remove some bbe deadcode
2024-12-23 12:21 UTC (5+ messages)
[PATCH 0/2] padata: fix UAF in padata_reorder
2024-12-23 9:00 UTC (6+ messages)
` [PATCH 2/2] "
[PATCH] crypto: fips - Use str_enabled_disabled() helper in fips_enable()
2024-12-23 7:54 UTC
[PATCH] crypto: qce - revert "use __free() for a buffer that's always freed"
2024-12-22 4:20 UTC (3+ messages)
[PATCH] crypto: ixp4xx: fix OF node reference leaks in init_ixp_crypto()
2024-12-22 4:19 UTC (2+ messages)
[PATCH v5 0/2] crypto: hisilicon - fix the authsize and icv problems of aead in sec
2024-12-22 4:19 UTC (2+ messages)
[PATCH v2 0/8] crypto: x86 - minor optimizations and cleanup to VAES code
2024-12-22 4:19 UTC (2+ messages)
[PATCH v5 00/12] zswap IAA compress batching
2024-12-22 4:07 UTC (14+ messages)
` [PATCH v5 01/12] crypto: acomp - Add synchronous/asynchronous acomp request chaining
` [PATCH v5 02/12] crypto: acomp - Define new interfaces for compress/decompress batching
` [PATCH v5 03/12] crypto: iaa - Add an acomp_req flag CRYPTO_ACOMP_REQ_POLL to enable async mode
` [PATCH v5 04/12] crypto: iaa - Implement batch_compress(), batch_decompress() API in iaa_crypto
` [PATCH v5 05/12] crypto: iaa - Make async mode the default
` [PATCH v5 06/12] crypto: iaa - Disable iaa_verify_compress by default
` [PATCH v5 07/12] crypto: iaa - Re-organize the iaa_crypto driver code
` [PATCH v5 08/12] crypto: iaa - Map IAA devices/wqs to cores based on packages instead of NUMA
` [PATCH v5 09/12] crypto: iaa - Distribute compress jobs from all cores to all IAAs on a package
` [PATCH v5 10/12] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching
` [PATCH v5 11/12] mm: zswap: Restructure & simplify zswap_store() to make it amenable for batching
` [PATCH v5 12/12] mm: zswap: Compress batching with Intel IAA in zswap_store() of large folios
[PATCH v1] crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'
2024-12-21 22:07 UTC
[PATCH] crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
2024-12-21 15:45 UTC (2+ messages)
[PATCH v9 0/3] crypto: Add EIP-93 crypto engine support
2024-12-21 11:44 UTC (5+ messages)
` [PATCH v9 1/3] spinlock: extend guard with spinlock_bh variants
` [PATCH v9 2/3] dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
` [PATCH v9 3/3] crypto: Add Inside Secure SafeXcel EIP-93 crypto engine support
[PATCH v11 00/22] Support more Amlogic SoC families in crypto driver
2024-12-21 11:37 UTC (10+ messages)
` [PATCH v11 01/22] crypto: amlogic - Don't hardcode IRQ count
` [PATCH v11 02/22] crypto: amlogic - Add platform data
` [PATCH v11 03/22] crypto: amlogic - Remove clock input
` [PATCH v11 04/22] crypto: amlogic - Add MMIO helpers
` [PATCH v11 05/22] crypto: amlogic - Move get_engine_number()
` [PATCH v11 06/22] crypto: amlogic - Drop status field from meson_flow
` [PATCH v11 11/22] crypto: amlogic - Introduce hasher
` [PATCH v11 22/22] arm64: dts: amlogic: axg: add crypto node
[PATCH v8 0/3] New s390 specific protected key hmac
2024-12-21 8:57 UTC (5+ messages)
` [PATCH v8 1/3] s390/crypto: Add protected key hmac subfunctions for KMAC
` [PATCH v8 2/3] s390/crypto: New s390 specific protected key hash phmac
` [PATCH v8 3/3] s390/crypto: Enable phmac selftest invocation
[PATCH v4 00/10] zswap IAA compress batching
2024-12-21 6:30 UTC (5+ messages)
` [PATCH v4 09/10] mm: zswap: Allocate pool batching resources if the crypto_alg supports batching
[PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
2024-12-20 19:52 UTC (23+ messages)
` [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
` [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
` [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
` [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP "
` [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
` [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
[PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-12-19 19:42 UTC (20+ messages)
` [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v12 02/19] x86: Secure Launch Kconfig
` [PATCH v12 03/19] x86: Secure Launch Resource Table header file
` [PATCH v12 04/19] x86: Secure Launch main "
` [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v12 06/19] x86: Add early SHA-256 "
` [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v12 10/19] x86: Secure Launch kernel late "
` [PATCH v12 11/19] x86: Secure Launch SMP bringup support
` [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v12 14/19] tpm, tpm_tis: Close all localities
` [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v12 18/19] x86: Secure Launch late initcall platform module
` [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
[PATCH v1] drivers/crypto/ccp: change signature of sp_init()
2024-12-19 8:12 UTC
[PATCH 0/7] Tegra Security Engine driver improvements
2024-12-17 16:12 UTC (8+ messages)
` [PATCH 1/7] crypto: tegra: Use separate buffer for setkey
` [PATCH 2/7] crypto: tegra: Do not use fixed size buffers
` [PATCH 3/7] crypto: tegra: check retrun value for hash do_one_req
` [PATCH 4/7] crypto: tegra: Transfer HASH init function to crypto engine
` [PATCH 5/7] crypto: tegra: Fix HASH intermediate result handling
` [PATCH 6/7] crypto: tegra: Fix CMAC "
` [PATCH 7/7] crypto: tegra: Set IV to NULL explicitly for AES ECB
next-20241216: drivers/crypto/qce/sha.c:365:3: error: cannot jump from this goto statement to its label
2024-12-16 18:45 UTC (3+ messages)
[GIT PULL] Crypto Update for 6.3
2024-12-14 17:18 UTC (12+ messages)
` [GIT PULL] Crypto Update for 6.4
` [GIT PULL] Crypto Update for 6.5
` [GIT PULL] Crypto Update for 6.6
` [GIT PULL] Crypto Update for 6.7
` [GIT PULL] Crypto Update for 6.8
` [GIT PULL] Crypto Fixes "
` [GIT PULL] Crypto Fixes for 6.9
` [GIT PULL] Crypto Fixes for 6.10
` [GIT PULL] Crypto Fixes for 6.12
` [GIT PULL] Crypto Fixes for 6.13
[PATCH v8 0/3] crypto: Add EIP-93 crypto engine support
2024-12-14 13:32 UTC (6+ messages)
` [PATCH v8 3/3] crypto: Add Inside Secure SafeXcel "
[PATCH 0/8] crypto: more alignmask cleanups
2024-12-14 9:29 UTC (2+ messages)
[PATCH 0/2] crypto: remove physical address support in skcipher_walk
2024-12-14 9:29 UTC (2+ messages)
[PATCH v3] crypto: ccp: Use scoped guard for mutex
2024-12-14 9:28 UTC (2+ messages)
[PATCH 0/9] crypto: qce - refactor the driver
2024-12-14 9:27 UTC (2+ messages)
[PATCH 01/10] crypto,fs: Separate out hkdf_extract() and hkdf_expand()
2024-12-14 4:39 UTC (2+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-12-14 2:56 UTC (16+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox